A Secured Dynamic Cluster-Based Wireless Sensor Network
暂无分享,去创建一个
[1] Maan Younis Abdullah,et al. Cluster-Based Security for Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[2] I.I. Ibrahim,et al. Efficient zero-knowledge identification scheme with secret key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[3] Yoshiaki Katayama,et al. Construction and Maintenance of a Novel Cluster-based Architecture for Ad Hoc Sensor Networks , 2008, Ad Hoc Sens. Wirel. Networks.
[4] Xuehai Zhou,et al. Distributed Node Authentication in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[5] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[6] Nadia M. G. Al-Saidi,et al. A new idea in zero knowledge protocols based on iterated function systems. , 2011 .
[7] Cheng-Chi Lee,et al. A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..
[8] Sencun Zhu,et al. Poster Abstract : LEAP – Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks , 2003 .
[9] Edward F. Schaefer,et al. A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.
[10] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[11] Chen Wei,et al. A better dynamic cluster-based structure of wireless sensor network for efficient routing , 2012 .
[12] A. Jain,et al. Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[13] Andrea Vitaletti,et al. Rijndael for Sensor Networks: Is Speed the Main Issue? , 2007, Electron. Notes Theor. Comput. Sci..
[14] Clifford Neuman,et al. Security and privacy using one-round zero-knowledge proofs , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[15] Kalpana Sharma,et al. Security Model for Hierarchical Clustered Wireless Sensor Networks , 2011 .
[16] Amir Shirkhodaie,et al. Novel Broadcast/Multicast Protocols for Dynamic Sensor Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[17] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[18] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[19] Lin SHEN,et al. A Dynamic Cluster-based Key Management Protocol in Wireless Sensor Networks , .
[20] I. Verbauwhede,et al. Interfacing a high speed crypto accelerator to an embedded CPU , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[21] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[22] G. Gong,et al. A Survey on Security in Wireless Sensor Networks , 2008 .
[23] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[24] Yong-Je Choi,et al. Low Power Circuit Architecture of AES Crypto Module for Wireless Sensor Network , 2007 .
[25] Sang Ho Lee,et al. A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN , 2008, J. Digit. Content Technol. its Appl..