Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks
暂无分享,去创建一个
[1] Tarik Taleb,et al. Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve , 2010, CMC 2010.
[2] Mohsen Guizani,et al. Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[3] Kui Ren,et al. Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[4] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[5] Prakhar Gupta,et al. Privacy preservation for WSN: A Survey , 2012 .
[6] Jacques Stern,et al. Efficient Revocation in Group Signatures , 2001, Public Key Cryptography.
[7] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .
[8] John Abraham,et al. Taking the pulse of the planet , 2017 .
[9] Bo Sheng,et al. WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes , 2007 .
[10] Junbeom Hur,et al. Fine-grained data access control for distributed sensor networks , 2011, Wirel. Networks.
[11] J. Deng,et al. Secure code distribution in dynamically programmable wireless sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[12] Jingsha He,et al. Secure Localization in Wireless Sensor Networks with Mobile Beacons , 2012, Int. J. Distributed Sens. Networks.
[13] Ivan Stojmenovic,et al. Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.
[14] Syed Masud Mahmud,et al. A broadcast protocol with drivers' anonymity for vehicle-to-vehicle communication networks , 2009 .
[15] Chun Chen,et al. Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[16] Bo Li,et al. The intrusion detection in mobile sensor network , 2012, TNET.
[17] Ubbarao,et al. Channel and Energy Modeling for Self-Contained Wireless Sensor Networks in Oil Reservoirs , 2015 .
[18] Chiara Petrioli,et al. AGREE: exploiting energy harvesting to support data-centric access control in WSNs , 2013, Ad Hoc Networks.
[19] Jan Camenisch,et al. Group Signatures: Better Efficiency and New Theoretical Aspects , 2004, SCN.
[20] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[21] Jie Li,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using ID-Based Digital Signature , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[22] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .