Symmetric key based authenticated querying in wireless sensor networks
暂无分享,去创建一个
[1] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[2] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[3] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[4] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[5] Robert Tappan Morris,et al. Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.
[6] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[9] Johann L. Hurink,et al. Wave Leader Election Protocol for Wireless Sensor Networks , 2002 .
[10] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[11] Johannes Gehrke,et al. Query Processing in Sensor Networks , 2003, CIDR.
[12] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[13] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[14] Robert Morris,et al. Capacity of ad hoc networks , 2001 .