IBE-Trust: A security framework for Wireless Sensor Networks
暂无分享,去创建一个
[1] John W. Rittinghouse,et al. Wireless Security: Know It All , 2008 .
[2] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[3] David Pollino,et al. Wireless security , 2002 .
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[6] Michael Scott,et al. On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.
[7] David Grawrock. Dynamics of a trusted platform: a building block approach , 2009 .
[8] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[9] Xiaotie Deng,et al. TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[10] Xiaotie Deng,et al. TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[11] Guido Appenzeller,et al. Identity-Based Encryption Architecture and Supporting Data Structures , 2009, RFC.
[12] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[13] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[14] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[15] Yusnani Mohd Yussoff,et al. Trusted Wireless Sensor Node Platform , 2010, WCE 2010.
[16] Choong Seon Hong,et al. Feasibility of PKC in resource-constrained wireless sensor networks , 2008, 2008 11th International Conference on Computer and Information Technology.
[17] S. Shankar Sastry,et al. Attacks And Defenses Of Ubiquitous Sensor Networks , 2009 .
[18] Zhi Guan,et al. Efficient Identity-Based Key Issue with TPM , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[19] Ricardo Dahab,et al. TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).
[20] Chunming Rong,et al. Identity-based key agreement and encryption for wireless sensor networks , 2006 .