Securing network access in wireless sensor networks
暂无分享,去创建一个
Peng Ning | An Liu | Roger Xu | W. Douglas Maughan | Kun Sun
[1] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[2] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[3] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[4] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[5] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .
[6] Benjamin Arazi,et al. CERTIFICATION OF DL / EC KEYS , 1999 .
[7] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[8] NingPeng,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005 .
[9] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[11] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[12] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[13] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.