Key Establishment in Multi-core Parallel Systems
暂无分享,去创建一个
[1] Deep Medhi,et al. Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach , 2007, TOSN.
[2] Yunghsiang Sam Han,et al. Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission , 2008, IEEE Transactions on Dependable and Secure Computing.
[3] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Des. Test Comput..
[6] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[7] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.
[8] Martin Hopkins,et al. Synergistic Processing in Cell's Multicore Architecture , 2006, IEEE Micro.
[9] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[10] Weijia Jia,et al. Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[11] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[12] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[13] Richard M. Karp,et al. Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..
[14] Shekhar Borkar. Thousand Core ChipsA Technology Perspective , 2007, DAC 2007.
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Deep Medhi,et al. A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[17] Fabrizio Petrini,et al. Cell Multiprocessor Communication Network: Built for Speed , 2006, IEEE Micro.
[18] Yunghsiang Sam Han,et al. Using MDS Codes for the Key Establishment of Wireless Sensor Networks , 2005, MSN.
[19] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[20] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[21] Vipul Gupta,et al. Accelerating next-generation public-key cryptosystems on general-purpose CPUs , 2005, IEEE Micro.
[22] Li Shang,et al. Three-dimensional multiprocessor system-on-chip thermal optimization , 2007, 2007 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[23] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[24] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[25] K. J. Ray Liu,et al. Index of Terms , 2016 .
[26] James D. Warnock,et al. Cell processor low-power design methodology , 2005, IEEE Micro.
[27] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[28] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[29] S. Asano,et al. The design and implementation of a first-generation CELL processor , 2005, ISSCC. 2005 IEEE International Digest of Technical Papers. Solid-State Circuits Conference, 2005..
[30] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[31] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[32] Pradeep Dubey,et al. Platform 2015: Intel ® Processor and Platform Evolution for the Next Decade , 2005 .
[33] H BloomBurton. Space/time trade-offs in hash coding with allowable errors , 1970 .
[34] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.
[35] Shekhar Y. Borkar,et al. Thousand Core ChipsA Technology Perspective , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[36] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[37] Yunghsiang Sam Han,et al. Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.