A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks
暂无分享,去创建一个
[1] Kamran Sayrafian-Pour,et al. Distributed Deployment Algorithms for Improved Coverage in a Network of Wireless Mobile Sensors , 2014, IEEE Transactions on Industrial Informatics.
[2] Kakali Chatterjee,et al. Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices , 2013, Int. J. Netw. Secur..
[3] Indranil Sengupta,et al. Secured hierarchical secret sharing using ECC based signcryption , 2012, Secur. Commun. Networks.
[4] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[5] Reza Azarderakhsh,et al. Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[6] Indranil Sengupta,et al. Improved secure dynamic key management scheme with access control in user hierarchy , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).
[7] Toyoo Takata,et al. Reducing data leakage possibility resulted from eavesdropping in wireless sensor network , 2013, Int. J. Space Based Situated Comput..
[8] Khaled M. Elleithy,et al. LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks , 2013, 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications.
[9] Hervé Guyennet,et al. Security in wireless sensor networks: a survey of attacks and countermeasures , 2011, Int. J. Space Based Situated Comput..
[10] Mohamad Naufal bin Mohamad Saad,et al. Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks , 2013, Int. J. Grid Util. Comput..
[11] Xu Huang,et al. Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[12] Jalel Ben-Othman,et al. Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).