暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Bülent Yener,et al. Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.
[3] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[4] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[5] J. Antonio García-Macías,et al. Deploying a voice capture sensor network system for a secure ubiquitous home environment , 2009, Int. J. Commun. Syst..
[6] Daehee Kim,et al. PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks , 2016, IEEE Sensors Journal.
[7] Wenfen Liu,et al. Two-factor authentication scheme using attribute and password , 2017, Int. J. Commun. Syst..
[8] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[9] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[10] Wenjing Lou,et al. Multi-User Broadcast Authentication in Wireless Sensor Networks , 2009 .
[11] W. Han. Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, IACR Cryptol. ePrint Arch..
[12] Mohsen Guizani,et al. PKC Based Broadcast Authentication using Signature Amortization for WSNs , 2012, IEEE Transactions on Wireless Communications.
[13] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[14] Alfred Menezes,et al. Handbook Of Applied Cryptography Crc Press , 2015 .
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[17] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.
[18] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.
[19] Mohammad S. Obaidat,et al. WHOMoVeS: An optimized broadband sensor network for military vehicle tracking , 2008, Int. J. Commun. Syst..
[20] Bin Zhao,et al. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks , 2008, Comput. Commun..
[21] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[22] Hao Chen,et al. An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring , 2013, Ad Hoc Networks.
[23] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[24] Hsiao-Hwa Chen,et al. Selecting key management schemes for WSN applications , 2012, Comput. Secur..
[25] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[26] Bruce Schneier,et al. Analysis of the SSL 3.0 protocol , 1996 .
[27] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[28] Mohammad S. Obaidat,et al. UCGNet: wireless sensor network-based active aquifer contamination monitoring and control system for underground coal gasification , 2017, Int. J. Commun. Syst..
[29] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[30] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[31] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[32] Pawel Kulakowski,et al. Performance study of wireless sensor and actuator networks in forest fire scenarios , 2013, Int. J. Commun. Syst..
[33] Kyung-Ah Shim,et al. EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.
[34] Mohammad Reza Aref,et al. A novel and low-energy PKC-based key agreement protocol for WSNs , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).
[35] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[36] Yacine Challal,et al. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[37] Yacine Challal,et al. A new class of Hash-Chain based key pre-distribution schemes for WSN , 2013, Comput. Commun..
[38] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[39] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[40] Min Jou,et al. Ubiquitous tutoring in laboratories based on wireless sensor networks , 2013, Comput. Hum. Behav..
[41] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[42] A Ajeena,et al. Two Factor user Authentication in Wireless Sensor Networks , 2018 .
[43] Anandarup Mukherjee,et al. Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks , 2016, Int. J. Commun. Syst..
[44] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[45] Chae Hoon Lim. Secure Code Dissemination and Remote Image Management Using Short-Lived Signatures in WSNs , 2011, IEEE Communications Letters.
[46] Mohammad Reza Aref,et al. Toward an energy efficient PKC-based key management system for wireless sensor networks , 2014, ISC Int. J. Inf. Secur..
[47] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.