Security for Sensor Networks
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[3] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[4] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[5] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[6] Yordan Kostov,et al. Low-cost optical instrumentation for biomedical measurements , 2000 .
[7] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[8] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[9] Mani B. Srivastava,et al. SensorSim: a simulation framework for sensor networks , 2000, MSWIM '00.
[10] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[11] Philippe Bonnet,et al. Towards Sensor Database Systems , 2001, Mobile Data Management.
[12] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[13] Samuel Madden,et al. Fjording the stream: an architecture for queries over streaming sensor data , 2002, Proceedings 18th International Conference on Data Engineering.
[14] Yee Wei Law,et al. Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .