A Dynamic ID-Based Authentication Scheme for M2M Communication of Healthcare Systems
暂无分享,去创建一个
[1] Kuldip Singh,et al. DDoS Incidents and their Impact: A Review , 2010, Int. Arab J. Inf. Technol..
[2] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[3] Xiaojiang Du,et al. A Survey on Sensor Network Security , 2008 .
[4] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[5] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] Mohsen Guizani,et al. An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.
[7] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[8] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[9] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[10] Jingsha He,et al. A hexagon-based key predistribution scheme in sensor networks , 2006, 2006 International Conference on Parallel Processing Workshops (ICPPW'06).
[11] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[12] Pål Spilling,et al. A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.
[13] Rabi N. Mahapatra,et al. An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[14] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[15] Chinya V. Ravishankar,et al. Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.
[16] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[17] Rabi N. Mahapatra,et al. Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[18] DAVID W. CARMAN,et al. New Directions in Sensor Network Key Management , 2005, Int. J. Distributed Sens. Networks.
[19] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[20] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[21] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[22] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.