Research on Security Issues of the Internet of Things
暂无分享,去创建一个
[1] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[2] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[3] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[4] Dimitrios Makrakis,et al. Location privacy and anonymity preserving routing for wireless sensor networks , 2008, Comput. Networks.
[5] Gene Tsudik,et al. QUEST Software and , 2022 .
[6] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[7] Marc Langheinrich,et al. Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.
[8] Chan Yeob Yeun,et al. New mutual agreement protocol to secure mobile RFID-enabled devices , 2008, Inf. Secur. Tech. Rep..
[9] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[10] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[11] Albrecht Schmidt,et al. Perci: Pervasive Service Interaction with the Internet of Things , 2009, IEEE Internet Computing.
[12] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.
[13] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[15] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[16] Shiuh-Pyng Shieh,et al. Adaptive Random Key Distribution Schemes for Wireless Sensor Networks , 2005 .
[17] K. Murugesan,et al. A Cross-Layer Design to Improve Spectral Efficiency in Wireless Networks , 2011 .
[18] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[19] Lei Zhang,et al. A Fair Energy Conserving Routing Algorithm for Wireless Sensor Networks , 2004, EUSAI.
[20] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[21] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[22] Yue Yin,et al. A Mobile-Sink Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[23] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[24] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.