Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks
暂无分享,去创建一个
Paulo S. L. M. Barreto | Marcos A. Simplício | Mats Näslund | Cintia B. Margi | Tereza Cristina M. B. Carvalho | Bruno Trevizan de Oliveira
[1] S. Venkatesan,et al. Role Assignment for Data Aggregation in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[2] Christof Paar,et al. Comparison of innovative signature algorithms for WSNs , 2008, WiSec '08.
[3] Paulo S. L. M. Barreto,et al. The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme , 2009, Secur. Commun. Networks.
[4] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.
[5] Stefan Tillich,et al. Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes , 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing.
[6] Fuxiang Gao,et al. Dynamic window based multihop authentication for WSN , 2010, CCS '10.
[7] Morris J. Dworkin,et al. SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .
[8] Fei Hu,et al. Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.
[9] Alan F. Smeaton,et al. Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..
[10] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[11] Sencun Zhu,et al. Predistribution and local collaboration-based group rekeying for wireless sensor networks , 2009, Ad Hoc Networks.
[12] Paulo S. L. M. Barreto,et al. The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking , 2008, PiLBA.
[13] Dharma P. Agrawal,et al. Ad Hoc and Sensor Networks: Theory and Applications , 2006 .
[14] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[15] Mihir Bellare,et al. The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency) , 2004 .
[16] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[17] Mohamed Ibnkahla,et al. Wireless sensor networks: Applications and challenges , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.
[18] Marine Minier,et al. Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks , 2007, WISTP.
[19] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[20] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[21] Phillip Rogaway,et al. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC , 2004, ASIACRYPT.
[22] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[23] Vincent Rijmen,et al. A New MAC Construction ALRED and a Specific Instance ALPHA-MAC , 2005, FSE.
[24] Rong Luo,et al. Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[25] Stefan Lucks. Two-Pass Authenticated Encryption Faster Than Generic Composition , 2005, FSE.
[26] Kyung Jun Choi,et al. Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[27] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[28] Jalel Ben-Othman,et al. Towards a classification of energy aware MAC protocols for wireless sensor networks , 2009, Wirel. Commun. Mob. Comput..
[29] Frank Mueller,et al. Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.
[30] Margaret Martonosi,et al. Hardware design experiences in ZebraNet , 2004, SenSys '04.
[31] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..