Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .
[3] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[4] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.
[5] Yusnani Mohd Yussoff,et al. Trusted Wireless Sensor Node Platform , 2010, WCE 2010.
[6] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[7] Johann Großschädl,et al. Reassessing the TCG specifications for trusted computing in mobile and embedded systems , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] H. Hashim,et al. Secure boot process for wireless sensor node , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.
[10] Guido Appenzeller,et al. Identity-Based Encryption Architecture and Supporting Data Structures , 2009, RFC.
[11] Piotr Szczechowiak,et al. TinyIBE: Identity-based encryption for heterogeneous sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[12] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.