Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
暂无分享,去创建一个
[1] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[2] Peter Desnoyers,et al. Ultra-low power data storage for sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[3] Deborah Estrin,et al. The design and implementation of a self-calibrating distributed acoustic sensing platform , 2006, SenSys '06.
[4] E. L. Miller,et al. Analysis and Construction of Galois Fields for Efficient Storage Reliability , 2007 .
[5] Deborah Estrin,et al. Multiresolution storage and search in sensor networks , 2005, TOS.
[6] Mira Belenkiy. Disjunctive Multi-Level Secret Sharing , 2008, IACR Cryptol. ePrint Arch..
[7] Dirk Westhoff,et al. Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .
[8] Dimitrios Gunopulos,et al. RISE - Co-S : high performance sensor storage and Co-processing architecture , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[9] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[10] Gene Tsudik,et al. Forward-Secure Sequential Aggregate Authentication , 2007, IACR Cryptol. ePrint Arch..
[11] Ethan L. Miller,et al. Designing a secure reliable file system for sensor networks , 2007, StorageSS '07.
[12] Prashant J. Shenoy,et al. Rethinking Data Management for Storage-centric Sensor Networks , 2007, CIDR.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] van der Arjan Schaft,et al. Systems and Networks , 1993 .
[15] Claudio Soriente,et al. New adversary and new threats: security in unattended sensor networks , 2009, IEEE Network.
[16] Dimitrios Gunopulos,et al. Towards In-Situ Data Storage in Sensor Databases , 2005, Panhellenic Conference on Informatics.
[17] I. Reed,et al. Polynomial Codes Over Certain Finite Fields , 1960 .
[18] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[19] Stefano Tessaro,et al. Optimal Resilience for Erasure-Coded Byzantine Distributed Storage , 2005, DISC.
[20] Marcos K. Aguilera,et al. Using erasure codes efficiently for storage in a distributed system , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[21] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[22] Gene Tsudik,et al. Extended Abstract: Forward-Secure Sequential Aggregate Authentication , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] B. Thuraisingham,et al. Secure sensor information management and mining , 2004, IEEE Signal Processing Magazine.