Integrity Enhancement in Wireless Sensor Networks
暂无分享,去创建一个
Yusnani Mohd Yussoff | Husna Zainol Abidin | Habibah Hashim | H. Z. Abidin | Y. M. Yussoff | H. Hashim
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Wei Pan,et al. Design and Implementation of Secure Embedded Systems Based on Trustzone , 2008, 2008 International Conference on Embedded Software and Systems.
[3] Jean-Philippe Babau,et al. An Ontology for Attacks in Wireless Sensor Networks , 2007 .
[4] Yit Pin Lai. Verilog design of a 256-bit AES crypto processor core , 2007 .
[5] G. Edward Suh,et al. Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.
[6] Johann Großschädl,et al. Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.
[7] Nidhi Verma,et al. Practical implementation and performance analysis on security of sensor networks , 2006 .
[8] Rajit Manohar,et al. An ultra low-power processor for sensor networks , 2004, ASPLOS XI.
[9] W.T. Penzhorn,et al. Cryptographic Hash Functions and Low-Power Techniques for Embedded Hardware , 2005, Proceedings of the IEEE International Symposium on Industrial Electronics, 2005. ISIE 2005..
[10] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[11] Choong Seon Hong,et al. Feasibility of PKC in resource-constrained wireless sensor networks , 2008, 2008 11th International Conference on Computer and Information Technology.
[12] Tomi Salo. Security in Pervasive Computing , 2001 .
[13] Erkay Savas,et al. Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security , 2008 .
[14] E. Lewis,et al. Wireless Sensor Node hardware: A review , 2008, 2008 IEEE Sensors.
[15] Johannes Winter,et al. Trusted computing building blocks for embedded linux-based ARM trustzone platforms , 2008, STC '08.
[16] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[17] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[18] Pan Wei,et al. Design and Implementation of Secure Embedded Systems Based on Trustzone , 2008 .
[19] Muhammad Amin,et al. Trends and Directions in Trusted Computing: Models, Architectures and Technologies , 2008 .
[20] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[21] Marcos Augusto M. Vieira,et al. Survey on wireless sensor network devices , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).
[22] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[23] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.
[24] Arul Paniandi. A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems , 2006 .
[25] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[26] Peter Wilson,et al. Implementing Embedded Security on Dual-Virtual-CPU Systems , 2007, IEEE Design & Test of Computers.
[27] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[28] Frank Stajano. Security in Pervasive Computing , 2003, SPC.
[29] Yu Han,et al. An Energy-Efficient AES-CCM Implementation for IEEE802.15.4 Wireless Sensor Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.