Lightweight Key Management for Adaptive Addressing in Next Generation Internet
暂无分享,去创建一个
[1] Nilanjan Dey,et al. A Real Time Dactylology Based Feature Extractrion for Selective Image Encryption and Artificial Neural Network , 2016 .
[2] Rung Ching Chen,et al. Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).
[3] Poonam N. Railkar,et al. Identity Management for Internet of Things , 2015 .
[4] Pardeep Kumar,et al. An efficient key pre-distribution scheme for wireless sensor network using public key cryptography , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[5] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[6] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[7] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[8] Satish Kumar,et al. Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks , 2013, Int. J. Ambient Comput. Intell..
[9] Yu-Kwong Kwok,et al. A Novel Key Redistribution Scheme for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[10] Vipin Jain,et al. A novel symmetric key encryption technique using Cellular Automata , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[11] Kefei Chen,et al. A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks , 2009, WISM.
[12] Liwen Zhang,et al. A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010 .
[13] Bülent Yener,et al. Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.
[14] Azeddine Bilami,et al. Compressed and distributed host identity protocol for end-to-end security in the IoT , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).
[15] Nilanjan Dey,et al. Symmetric Key Encryption Technique , 2016 .
[16] D. G. Chandra,et al. A Comparative Study on IPv4 and IPv6 , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[17] Chen Kefei,et al. A Reliable Pairwise Key-Updating Scheme for Sensor Networks , 2007 .
[18] Yong Wang,et al. An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks , 2010, Wirel. Sens. Netw..
[19] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[20] Mohammad Umar Siddiqi,et al. Cryptographically Generated Addresses (CGAs): A survey andan analysis of performance for use in mobile environment , 2011 .
[21] Xu Li,et al. A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.
[22] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[23] Pekka Nikander,et al. Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.
[24] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[25] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..