Authenticating messages in wireless sensor networks
暂无分享,去创建一个
[1] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[2] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[5] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[6] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[7] Bo Sheng,et al. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[8] Jie Wu,et al. Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.