Security in ad-hoc sensor networks with pre-loaded Time Limited Memory Keys
暂无分享,去创建一个
[1] Athanasios V. Vasilakos,et al. Body Area Networks: A Survey , 2010, Mob. Networks Appl..
[2] Owen Rees,et al. Efficient and timely mutual authentication , 1987, OPSR.
[3] Klas Fokine. Key Management in Ad Hoc Networks , 2002 .
[4] M. Ivimey. Annual report , 1958, IRE Transactions on Engineering Writing and Speech.
[5] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[6] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[7] Dharma P. Agrawal,et al. Scalable security schemes for ad hoc networks , 2002, MILCOM 2002. Proceedings.
[8] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[9] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[10] Khushboo Tripathi,et al. Performance of DSDV Protocol over Sensor Networks , 2010 .
[11] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[12] Jong-Tae Park,et al. Energy-efficient MAC protocols for wireless body area networks: Survey , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.
[13] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[15] Jean-Yves Le Boudec,et al. The Selfish Node: Increasing Routing Security for Mobile Ad Hoc Networks , 2001 .
[16] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .