A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
暂无分享,去创建一个
[1] Yang Xiao,et al. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks , 2011, Comput. Networks.
[2] Praveen Budhwar,et al. TinyOS: An Operating System for Wireless Sensor Networks , 2015 .
[3] Merad Boudia Omar Rafik,et al. The impact of ECC's scalar multiplication on wireless sensor networks , 2013, 2013 11th International Symposium on Programming and Systems (ISPS).
[4] Lidong Chen,et al. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .
[5] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[6] Hung-Min Sun,et al. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[7] David Pointcheval,et al. The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes , 2001, Public Key Cryptography.
[8] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[9] Hung-Min Sun,et al. An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks , 2008, 2008 International Conference on Embedded Software and Systems.
[10] Jonathan Katz,et al. Aggregate Message Authentication Codes , 1995 .
[11] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[12] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[13] Mustapha Hedabou,et al. Some Ways to Secure Elliptic Curve Cryptosystems , 2008 .
[14] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[15] Billy Bob Brumley,et al. Fast Point Decompression for Standard Elliptic Curves , 2008, EuroPKI.
[16] Sanjay Kumar Madria,et al. Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis , 2009, 2012 IEEE 13th International Conference on Mobile Data Management.
[17] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[18] Murat Demirbas,et al. The impact of data aggregation on the performance of wireless sensor networks , 2008 .
[19] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[20] Claude Castelluccia,et al. A security framework for privacy-preserving data aggregation in wireless sensor networks , 2011, TOSN.
[21] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[22] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[23] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[24] Yang Xiang,et al. A secure and efficient data aggregation scheme for wireless sensor networks , 2011, Concurr. Comput. Pract. Exp..
[25] Sanjay Kumar Madria,et al. Secure hierarchical data aggregation in wireless sensor networks , 2009, WCNC.
[26] Mohammed Feham,et al. Fast and secure implementation of ECC-based concealed data aggregation in WSN , 2013, Global Information Infrastructure Symposium - GIIS 2013.
[27] Craig Gentry,et al. Security and Cryptography for Networks - SCN 2012 , 2005 .
[28] François-Xavier Standaert,et al. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks , 2010, MOBILIGHT.
[29] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[30] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[31] Joonsang Baek,et al. Realizing Stateful Public Key Encryption in Wireless Sensor Network , 2008, SEC.
[32] Chae Hoon Lim,et al. More Flexible Exponentiation with Precomputation , 1994, CRYPTO.
[33] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[34] Cristina Alcaraz,et al. Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? , 2010, IWSEC 2010.
[35] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[36] H. Cam,et al. SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[37] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[38] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[39] Jongsung Kim,et al. On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) , 2006, SCN.
[40] Mihir Bellare,et al. Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation , 2006, CCS '06.
[41] Dirk Westhoff,et al. A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.
[42] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[43] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[44] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[45] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[46] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[47] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[48] Claude Castelluccia,et al. On the Privacy of Concealed Data Aggregation , 2007, ESORICS.