暂无分享,去创建一个
[1] Shio Kumar Singh,et al. A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .
[2] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[3] Mark G. Terwilliger,et al. Overview of Sensor Networks , 2004 .
[4] Laszlo B. Kish,et al. Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.
[5] J. F. Dynes,et al. Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography , 2011, 1106.2675.
[6] J. Skaar,et al. Thermal blinding of gated detectors in quantum cryptography. , 2010, Optics express.
[7] Laszlo B. Kish,et al. UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.
[8] L. Kish,et al. TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.
[9] Laszlo B. Kish,et al. Cable Capacitance Attack against the KLJN Secure Key Exchange , 2015, Inf..
[10] Laszlo B. Kish,et al. On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator , 2013, Quantum Inf. Process..
[11] Cheng-Chi Lee,et al. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.
[12] Gang Qu,et al. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[13] J. Skaar,et al. Tailored bright illumination attack on distributed-phase-reference protocols , 2010, 1012.4366.
[14] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] Horace P. Yuen,et al. Essential elements lacking in security proofs for quantum key distribution , 2013, Optics/Photonics in Security and Defence.
[16] Raju Dutta,et al. Energy efficient modified SPIN protocol with high security in Wireless Sensor Networks using TOSSIM , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.
[17] Laszlo B. Kish,et al. Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.
[18] Gerd Leuchs,et al. Trojan-horse attacks threaten the security of practical quantum cryptography , 2014, 1406.5813.
[19] Xiaolin Cao,et al. Securing vehicle communication systems by the KLJN key exchange protocol , 2014, ArXiv.
[20] Laszlo B. Kish,et al. On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott , 2014, ArXiv.
[21] J. Scheuer,et al. Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.
[22] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[23] Laszlo B. Kish,et al. Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.
[24] Xiaohui Liang,et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[25] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[26] Srinivasa Rao,et al. An Overview of Wireless Sensor Networks Applications and Security , 2012 .
[27] Laszlo B. Kish. RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .
[28] S. Quartz,et al. Getting to Know You: Reputation and Trust in a Two-Person Economic Exchange , 2005, Science.
[29] Robert Mingesz,et al. What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange? , 2014, The Random and Fluctuating World.
[30] Laszlo B. Kish,et al. Enhanced usage of keys obtained by physical, unconditionally secure distributions , 2014, ArXiv.
[31] Laszlo B. Kish,et al. Unconditional Security by the Laws of Classical Physics , 2013 .
[32] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[33] Vadim Makarov,et al. Comment on “Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography” [Appl. Phys. Lett. 98, 231104 (2011)] , 2011, 1106.3756.
[34] BoukercheAzzedine,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008 .
[35] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[36] Annapurna Jonnalagadda,et al. A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2015 .
[37] Vadim Makarov,et al. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..
[38] Christian Kurtsiefer,et al. Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.
[39] Chun Chen,et al. Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.
[40] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[41] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[42] Derek Abbott,et al. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.
[43] Xiaolin Cao,et al. On KLJN-based secure key distribution in vehicular communication networks , 2014, The Random and Fluctuating World.
[44] Rabi N. Mahapatra,et al. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[45] Laszlo B. Kish,et al. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System , 2014, Entropy.
[46] Deborah Estrin,et al. Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.
[47] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[48] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[49] Eman Shaaban,et al. Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.
[50] Muhammad Zahir Shah,et al. Security and Privacy Issues in Wireless Sensor Networks , 2011 .
[51] J. Skaar,et al. After-gate attack on a quantum cryptosystem , 2010, 1009.2683.
[52] Robert S. Balog,et al. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.
[53] Robert Mingesz,et al. Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System , 2014, PloS one.
[54] Bernd Lahno,et al. Is Trust the Result of Bayesian Learning , 2004 .
[55] Laszlo B. Kish,et al. Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? , 2014, The Random and Fluctuating World.
[56] Yao Liang,et al. Towards Long-Term Multi-Hop WSN Deployments for Environmental Monitoring: An Experimental Network Evaluation , 2014, J. Sens. Actuator Networks.
[57] Ferdinand Peper,et al. Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..
[58] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[59] A. Jain,et al. Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[60] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[61] Horace P. Yuen,et al. On the Foundations of Quantum Key Distribution - Reply to Renner and Beyond , 2012 .
[62] J. Skaar,et al. Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.
[63] Chiman Kwan,et al. Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.
[64] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[65] Cui Li,et al. Overview of Wireless Sensor Networks , 2005 .
[66] L. Kish,et al. Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.
[67] Laszlo B. Kish. PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .
[68] Laszlo B. Kish,et al. Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system , 2014, ArXiv.
[69] Robert S. Balog,et al. Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges , 2015, Entropy.