Efficient and Secure Code Dissemination in Sensor Clouds
暂无分享,去创建一个
[1] Peng Ning,et al. Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[2] K. Sakurai,et al. Realizing Proxy Re-encryption in the Symmetric World , 2011 .
[3] Madoka Yuriyama,et al. Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[4] Lili Qiu,et al. S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks , 2010, IEEE/ACM Transactions on Networking.
[5] David E. Culler,et al. Incremental network programming for wireless sensors , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[6] David E. Culler,et al. Securing the Deluge network programming system , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[7] Rainer Koschke,et al. Aiding program comprehension by static and dynamic feature analysis , 2001, Proceedings IEEE International Conference on Software Maintenance. ICSM 2001.
[8] Sanjay Kumar Madria,et al. Challenges in Secure Sensor-Cloud Computing , 2011, Secure Data Management.
[9] Joel Koshy,et al. Remote incremental linking for energy-efficient reprogramming of sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[10] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[11] Hossam S. Hassanein,et al. No-reboot and zero-flash over-the-air programming for Wireless Sensor Networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[12] Koen Langendoen,et al. Efficient code distribution in wireless sensor networks , 2003, WSNA '03.
[13] Yunhao Liu,et al. R2: Incremental Reprogramming Using Relocatable Code in Networked Embedded Systems , 2013, IEEE Transactions on Computers.
[14] Weijia Li,et al. Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[15] Sanjay Kumar Madria,et al. Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis , 2009, 2012 IEEE 13th International Conference on Mobile Data Management.
[16] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[17] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[18] David E. Culler,et al. The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.
[19] John Zic,et al. A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks , 2009, WiSec '09.