Frequency-hopping based Secure Schemes in Sensornets
暂无分享,去创建一个
[1] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[2] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[3] Mike Chen,et al. Security and Deployment Issues in a Sensor Network , 2000 .
[4] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[5] Anupam Joshi,et al. Security for wireless sensor networks , 2004 .
[6] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[10] Stephan Olariu,et al. Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.
[11] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[12] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[13] Anupam Joshi,et al. Secure sensor networks for perimeter protection , 2003, Comput. Networks.