Secure Data Distribution Scheme with Two-Hop Survival Strategy for Unattended WSNs
暂无分享,去创建一个
Yi Jiang | Wei Cheng | Yong Li | Xipeng Yin
[1] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[2] Frank Y. Li,et al. Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs , 2013, Comput. Commun..
[3] John C. McEachen,et al. Performance of a Wireless Unattended Sensor Network in a Freshwater Environment , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[4] Gene Tsudik,et al. Forward-Secure Sequential Aggregate Authentication , 2007, IACR Cryptol. ePrint Arch..
[5] E. K. Park,et al. The Effective Radius Model for Multi-hop Wireless Networks , 2006, WASA.
[6] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[7] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[8] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[9] Gene Tsudik,et al. Extended Abstract: Forward-Secure Sequential Aggregate Authentication , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[11] Gene Tsudik,et al. DISH: Distributed Self-Healing , 2008, SSS.
[12] Claudio Soriente,et al. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks , 2008, 2008 Symposium on Reliable Distributed Systems.
[13] Frank Y. Li,et al. A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.