暂无分享,去创建一个
[1] Sajal K. Das,et al. A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[2] Insup Lee,et al. Sensor Network Security: More Interesting Than You Think , 2006, HotSec.
[3] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Chin-Tser Huang,et al. LOFT: Low-Overhead Freshness Transmission in Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[5] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[7] Sami S. Al-Wakeel,et al. PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] S. Sitharama Iyengar,et al. Energy equivalence routing in wireless sensor networks , 2004, Microprocess. Microsystems.
[10] A. Zomaya,et al. A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..
[11] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[12] Nael B. Abu-Ghazaleh,et al. An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.
[13] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[14] E. Lewis,et al. Resources Implications for Data Security in Wireless Sensor Network Nodes , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).
[15] Mingbo Xiao,et al. Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[16] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[17] Kameswari Chebrolu,et al. Censor networks: a critique of "sensor networks" from a systems perspective , 2008, CCRV.
[18] Sanjay Burman,et al. Cryptography and security - future challenges and issues , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[19] Dennis Pfisterer,et al. Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.
[20] Tae Kyung Kim,et al. A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .
[21] Yee Wei Law,et al. How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[22] Tassos Dimitriou,et al. Providing Transparent Security Services to Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[23] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[24] Adrian Perrig,et al. Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.