A Privacy Preserving Security Protocol-Based Application for Wireless Communication System
暂无分享,去创建一个
Sanggon Lee | Young-Sil Lee | Hoon-Jae Lee | Bruce Ndibanje | Hoon-Jae Lee | Sanggon Lee | Bruce Ndibanje | Young-Sil Lee
[1] Sungyoung Lee,et al. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.
[2] Peng Gong,et al. A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.
[3] Bruce Schneier,et al. Analysis of the SSL 3.0 protocol , 1996 .
[4] Joonsang Baek,et al. Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.
[5] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[6] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Pardeep Kumar,et al. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.
[9] Sipra Das Bit,et al. A lightweight security scheme for query processing in clustered wireless sensor networks , 2015, Comput. Electr. Eng..
[10] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[11] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2013, Comput. Secur..
[12] Mohsen Guizani,et al. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[13] Jong Hyuk Park,et al. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..
[14] Hovav Shacham,et al. When private keys are public: results from the 2008 Debian OpenSSL vulnerability , 2009, IMC '09.
[15] Chun Chen,et al. Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.
[16] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[17] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[18] Vitaly Shmatikov,et al. The most dangerous code in the world: validating SSL certificates in non-browser software , 2012, CCS.
[19] Neeraj Kumar,et al. A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[20] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[21] Johann Großschädl,et al. The energy cost of cryptographic key establishment in wireless sensor networks , 2007, ASIACCS '07.