SeGrid: A Secure Grid Framework for Sensor Networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[3] Chinya V. Ravishankar,et al. Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.
[4] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[5] Azzedine Boukerche,et al. Energy-aware data-centric routing in microsensor networks , 2003, MSWIM '03.
[6] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[7] Fang Liu,et al. iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[8] Xiuzhen Cheng,et al. PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks , 2005, ICCNMC.
[9] Qian Zhang,et al. A power controlled interference aware routing protocol for dense multi-hop wireless networks , 2008, Wirel. Networks.
[10] Wenjing Lou,et al. Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Xiuzhen Cheng,et al. TPS: a time-based positioning scheme for outdoor wireless sensor networks , 2004, IEEE INFOCOM 2004.
[13] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[14] Deborah Estrin,et al. ASCENT: adaptive self-configuring sensor networks topologies , 2004, IEEE Transactions on Mobile Computing.
[15] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[16] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[17] Xiuzhen Cheng,et al. iTPS: an improved location discovery scheme for sensor networks with long-range beacons , 2005, J. Parallel Distributed Comput..
[18] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Fang Liu,et al. TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons , 2005, ICCNMC.
[21] Deborah Estrin,et al. An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[22] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[23] Donggang Liu,et al. Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.
[24] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[25] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[26] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[27] Xiuzhen Cheng,et al. Fault-tolerant target detection in sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[28] Krishna M. Sivalingam,et al. A Survey of Energy Efficient Network Protocols for Wireless Networks , 2001, Wirel. Networks.
[29] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[30] Xiuzhen Cheng,et al. Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[31] Robert Tappan Morris,et al. Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.
[32] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[33] Deborah Estrin,et al. Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.
[34] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[35] Fang Liu,et al. SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks , 2008, IEEE Transactions on Mobile Computing.