Realizing Robust User Authentication in Sensor Networks
暂无分享,去创建一个
[1] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[2] Zinaida Benenson,et al. An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[3] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[4] Zinaida Benenson,et al. Authenticated queries in sensor networks , 2005 .
[5] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[6] Ramesh Govindan,et al. Networking support for query processing in sensor networks , 2004, CACM.
[7] Wolfgang Bauer. Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Vipul Gupta,et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[10] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[11] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[12] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[13] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[14] David E. Culler,et al. Versatile low power media access for wireless sensor networks , 2004, SenSys '04.