HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] Matthew J. Campagna. Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator , 2006, IACR Cryptol. ePrint Arch..
[4] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[5] Yukun Huang,et al. Research of Efficient Security Scheme in Wireless Network , 2014 .
[6] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[7] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[8] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.
[9] Marine Minier,et al. Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.
[10] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[11] Deborah Estrin,et al. Packet combining in sensor networks , 2005, SenSys '05.
[12] Christophe Clavier,et al. Optimal Statistical Power Analysis , 2003, IACR Cryptol. ePrint Arch..
[13] Yongtae Shin,et al. AES Implementation and Performance Evaluation on 8-bit Microcontrollers , 2009, ArXiv.
[14] Qun Li,et al. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.
[15] Yunhao Liu,et al. DPLC: Dynamic Packet Length Control in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[16] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[17] Ding-Zhu Du,et al. Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..
[18] Hari Balakrishnan,et al. Cross-layer wireless bit rate adaptation , 2009, SIGCOMM '09.
[19] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[20] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[21] Yu Hen Hu,et al. Cycle-Efficient LFSR Implementation on Word-Based Microarchitecture , 2013, IEEE Transactions on Computers.
[22] Hassan N. Noura,et al. E3SN: Efficient security scheme for sensor networks , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[23] Hassan N. Noura,et al. Key dependent cipher scheme for sensor networks , 2013, 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).
[24] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[25] Ilya Mironov,et al. (Not So) Random Shuffles of RC4 , 2002, IACR Cryptol. ePrint Arch..
[26] Christine Evans-Pughe,et al. Bzzzz zzz [ZigBee wireless standard] , 2003 .
[27] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[28] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .