Security Enhancement of Wireless Sensor Networks Using Signal Intervals
暂无分享,去创建一个
[1] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[2] M. Mosleh,et al. Notice of Violation of IEEE Publication PrinciplesA new secure scheme purposed for recognition and authentication protocol in Bluetooth environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[3] Guofang Zhang,et al. A System Architecture Design Scheme of the Secure Chip Based on SoC , 2009, 2009 International Workshop on Intelligent Systems and Applications.
[4] E. K. Gannett,et al. THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS , 1965 .
[5] Michel Renovell,et al. Scan Design and Secure Chip , 2004, IOLTS.
[6] K. Hypponen,et al. “Nino” man-in-the-middle attack on bluetooth secure simple pairing , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[7] Jens Eliasson,et al. Time synchronous Bluetooth sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[8] Srdjan Krco,et al. Bluetooth Based Wireless Sensor Networks –Implementation Issues and Solutions , 2002 .
[9] Kwangjo Kim,et al. Wireless Authentication Protocol Preserving User Anonymity , 2001 .
[10] Sandra Kay Miller. Facing the Challenge of Wireless Security , 2001, Computer.
[11] Jian Wang,et al. Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[12] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[13] Keijo Haataja,et al. Security Threats and Countermeasures in Bluetooth-Enabled Systems , 2009 .
[14] Chang-Seop Park,et al. Secure Key Distribution Protocol for ZigBee Wireless Sensor Network , 2012 .
[15] B. P. Lathi,et al. Modern Digital and Analog Communication Systems , 1983 .
[16] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[17] Tao,et al. A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks , 2013 .
[18] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[19] K. Hypponen,et al. Man-In-The-Middle attacks on bluetooth: a comparative analysis, a novel attack, and countermeasures , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.
[20] R. F. Olanrewaju,et al. A Secure Authentication Scheme for Bluetooth Connection , 2014, 2014 International Conference on Computer and Communication Engineering.
[21] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.
[22] Thian Song Ong,et al. Secure biometric template protection via randomized dynamic quantization transformation , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[23] K. Haataja,et al. Practical Man-in-the-Middle Attacks Against Bluetooth Secure Simple Pairing , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[24] Kenneth Rose,et al. On Constrained Randomized Quantization , 2012, IEEE Transactions on Signal Processing.
[25] N. Asokan,et al. Security Associations in Personal Networks: A Comparative Analysis , 2007, ESAS.
[26] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[27] Anand R. Tripathi,et al. Mutual Authentication in Wireless Networks , 1997 .
[28] Bong-Hwan Kim,et al. Analysis of ZigBee Security Mechanism , 2012 .
[29] Keijo Haataja,et al. New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[30] Gunhee Lee,et al. A Key Establishment Scheme for Providing Secure Multicasting over Bluetooth Scatternets , 2007, 2007 Second International Conference on Communications and Networking in China.
[31] Hillary Brown. Building for high performance , 2000 .
[32] Gerrit Beldman,et al. Lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[33] Daniel Cvrcek. Security of Wireless Communication , 2008, FIDIS.