The Conformation of Trusted Sensor Network
暂无分享,去创建一个
[1] P. Ning,et al. Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .
[2] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[3] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[4] Hyunyoung Lee,et al. A Distributed Authentication Scheme for a Wireless Sensing System , 2005 .
[5] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] Charanjit S. Jutla. Encryption Modes with Almost Free Message Integrity , 2001, EUROCRYPT.
[7] Charanjit S. Jutla,et al. Encryption Modes with Almost Free Message Integrity , 2001, Journal of Cryptology.
[8] G.J. Minden,et al. A survey of active network research , 1997, IEEE Communications Magazine.
[9] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[10] Mohamed Younis,et al. Performance evaluation of load-balanced clustering of wireless sensor networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[11] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[12] Jean-Claude Laprie,et al. Dependable computing: concepts, limits, challenges , 1995 .
[13] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[14] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.