Distributed node authentication in wireless sensor networks
暂无分享,去创建一个
[1] R.L. Moses,et al. Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.
[2] Brad Karp,et al. GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.
[3] Gyula Simon,et al. The flooding time synchronization protocol , 2004, SenSys '04.
[4] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[5] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[6] Joseph M. Hellerstein,et al. Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[7] Daniel Massey,et al. Security Through Publicity , 2006, HotSec.
[8] Scott Rose,et al. Protocol Modifications for the DNS Security Extensions , 2005, RFC.
[9] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[10] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[11] Young-Jin Kim,et al. Multi-dimensional range queries in sensor networks , 2003, SenSys '03.
[12] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[13] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[14] Joseph Kee-yin Ng,et al. Extensions to BGP to Support Secure Origin BGP , 2004 .