On the optimal allocation of adversarial resources
暂无分享,去创建一个
[1] K. Nahrstedt,et al. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[2] Gang Zhou,et al. VigilNet: An integrated sensor network system for energy-efficient surveillance , 2006, TOSN.
[3] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[4] K. Ren,et al. A Proactive Data Security Framework for Mission-Critical Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[7] Damla Turgut,et al. Stealthy dissemination in intruder tracking sensor networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[10] John Holland,et al. Adaptation in Natural and Artificial Sys-tems: An Introductory Analysis with Applications to Biology , 1975 .
[11] Panagiotis Papadimitratos,et al. Efficient and Robust Secure Aggregation for Sensor Networks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.
[12] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[13] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[14] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[15] Ellis Horowitz,et al. Computing Partitions with Applications to the Knapsack Problem , 1974, JACM.
[16] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Panagiotis Papadimitratos,et al. Resilient data aggregation for unattended WSNs , 2011, 2011 IEEE 36th Conference on Local Computer Networks.
[18] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[19] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[20] Panagiotis Papadimitratos,et al. GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[21] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[22] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .