Key Management Mechanism for Authentication Security in Wireless Sensor Network
暂无分享,去创建一个
[1] Jacques Stern,et al. Signing on a Postcard , 2000, Financial Cryptography.
[2] Qi Shi,et al. Component-based security system (COMSEC) with QoS for wireless sensor networks , 2013, Secur. Commun. Networks.
[3] Jonathan Loo,et al. Intrusion Detection and Security Mechanisms for Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[4] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[5] Min Yoon,et al. A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[6] Yong-Min Liu,et al. A Protocol Model for Wireless Sensor Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[7] Jang-Ping Sheu,et al. Boundary Node Selection and Target Detection in Wireless Sensor Network , 2007, 2007 IFIP International Conference on Wireless and Optical Communications Networks.
[8] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[9] Chun Chen,et al. Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.
[10] Ramjee Prasad,et al. Reliable and Secure Cooperative Communication for Wireless Sensor Networks Making Use of Cooperative Jamming with Physical Layer Security , 2013, Wirel. Pers. Commun..
[11] Yong Yu,et al. Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEICE Trans. Inf. Syst..
[12] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[13] Cheng-Chi Lee,et al. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.
[14] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.
[15] P. Fortier,et al. A comparison between different FHSS techniques for use in a multiple access secure wireless sensor network , 2006, 2006 IEEE Annual Wireless and Microwave Technology Conference.
[16] Xinping Guan,et al. Balance energy-efficient and real-time with reliable communication protocol for wireless sensor network , 2013 .
[17] Da-Zhi Sun,et al. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[18] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[19] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[20] Cheng Hong-bing. An Efficient Key Agreement Scheme for Wireless Sensor Networks , 2008 .
[21] Qiaoyan Wen,et al. Efficient and provably-secure certificateless short signature scheme from bilinear pairings , 2009, Comput. Stand. Interfaces.
[22] Yunlong Zhu,et al. A Multi-Layered Energy-Efficient and Delay-Reduced Chain-Based Data Gathering Protocol for Wireless Sensor Network , 2008, 2008 IEEE/ASME International Conference on Mechtronic and Embedded Systems and Applications.
[23] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[24] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[25] Zhao Jing. Research on Cloud Trust Model for Malicious Node Detection in Wireless Sensor Network , 2012 .
[26] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[27] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[28] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[29] Tomotaka Wada,et al. Effective Barrier Coverage Constructions for Improving Border Security in Wireless Sensor Networks , 2013, IEICE Trans. Commun..
[30] Ma Chun-guang. Survey on Identity-based Key Establishment Protocols for Wireless Sensor Networks , 2010 .
[31] Zhang Xiao. WSN's Key Questions and Its Military Applications , 2007 .
[32] Xu Tian-wei. Multi-layered energy-efficient and delay-reducing chain-based data gathering protocol for wireless sensor network , 2008 .
[33] Wang Hui. ABE-IBS based signature-encryption method for WSN , 2010 .