Key Management for Secure Demand Data Communication in Constrained Micro-Grids
暂无分享,去创建一个
Christoph Meinel | Stephen D. Wolthusen | Anne V. D. M. Kayem | Heinrich Strauss | C. Meinel | S. Wolthusen | Anne Kayem | H. Strauss
[1] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[2] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[3] Gianluca Dini,et al. LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks , 2011, TECS.
[4] Srinivasa Rao,et al. An Overview of Wireless Sensor Networks Applications and Security , 2012 .
[5] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[6] Paulo S. L. M. Barreto,et al. The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking , 2008, PiLBA.
[7] Kah Phooi Seng,et al. A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..
[8] Thomas Peyrin,et al. The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..
[9] Dan Boneh,et al. Ensuring high-quality randomness in cryptographic key generation , 2013, CCS.
[10] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[11] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[12] Babu Narayanan,et al. POWER SYSTEM STABILITY AND CONTROL , 2015 .
[13] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[14] Gianluca Dini,et al. An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[17] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..