Security considerations for IEEE 802.15.4 networks
暂无分享,去创建一个
[1] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[2] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[3] Mihir Bellare,et al. A concrete security treatment of symmet-ric encryption: Analysis of the DES modes of operation , 1997, FOCS 1997.
[4] Gregory L. Duckworth,et al. Acoustic counter-sniper system , 1997, Defense + Security Symposium.
[5] Steven M. Bellovin,et al. Problem Areas for the IP Security Protocols , 1996, USENIX Security Symposium.
[6] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[7] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[8] Vincent Rijmen,et al. The Block Cipher Rijndael , 1998, CARDIS.
[9] David E. Culler,et al. Lessons from a Sensor Network Expedition , 2004, EWSN.
[10] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.