-
1
-
-
33646943487
-
Security and privacy in RFID and applications in telemedicine
-
Xiao Y., Shen X., Sun B., and Cai L. Security and privacy in RFID and applications in telemedicine. IEEE Commun. Mag. (2006) 64-72
-
(2006)
IEEE Commun. Mag.
, pp. 64-72
-
-
Xiao, Y.1
Shen, X.2
Sun, B.3
Cai, L.4
-
2
-
-
33746734206
-
-
B. Sun, C.C. Li, K. Wu, Y. Xiao, A Lightweight Secure Protocol for Wireless Sensor Networks, Elsevier Computer Communications Journal Special Issue on Wireless Sensor Networks: Performance Reliability, Security and Beyond, 2006, pp. 2556-2568.
-
B. Sun, C.C. Li, K. Wu, Y. Xiao, A Lightweight Secure Protocol for Wireless Sensor Networks, Elsevier Computer Communications Journal Special Issue on Wireless Sensor Networks: Performance Reliability, Security and Beyond, 2006, pp. 2556-2568.
-
-
-
-
3
-
-
14844294769
-
-
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: ACM CCS'04, Washington, DC, USA, October 2004, pp. 210-219.
-
D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: ACM CCS'04, Washington, DC, USA, October 2004, pp. 210-219.
-
-
-
-
4
-
-
33847330246
-
-
T. Dimitriou, A lightweight RFID protocol to protect against traceability and cloning attacks, in: IEEE SecureComm'05, Athens, Greece, September 2005, pp. 59-66.
-
T. Dimitriou, A lightweight RFID protocol to protect against traceability and cloning attacks, in: IEEE SecureComm'05, Athens, Greece, September 2005, pp. 59-66.
-
-
-
-
5
-
-
85081447381
-
-
S.A. Weis, New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing, Ph.D. Dissertation, MIT, May 2006.
-
S.A. Weis, New Foundations for Efficient Authentication, Commutative Cryptography, and Private Disjointness Testing, Ph.D. Dissertation, MIT, May 2006.
-
-
-
-
6
-
-
33751528815
-
-
Y. Xiao, H.-H Chen, B. Sun, R. Wang, S. Sethi, MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, Article ID 93830, 2006.
-
Y. Xiao, H.-H Chen, B. Sun, R. Wang, S. Sethi, MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, Article ID 93830, 2006.
-
-
-
-
7
-
-
26444574670
-
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: ACM Sensys'04, Baltimore, MD, 2004, pp. 162-175.
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: ACM Sensys'04, Baltimore, MD, 2004, pp. 162-175.
-
-
-
-
8
-
-
23244467182
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du W., Deng J., Han Y.-S., Varshney P., Katz J., and Khalili A. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inform. Syst. Security (TISSEC) 8 2 (2005) 228-258
-
(2005)
ACM Trans. Inform. Syst. Security (TISSEC)
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.-S.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
9
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
Du W., Deng J., Han Y.-S., and Varshney P. A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Depend. Secure Comput. 3 2 (2006) 62-77
-
(2006)
IEEE Trans. Depend. Secure Comput.
, vol.3
, Issue.2
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.-S.3
Varshney, P.4
-
10
-
-
36349028029
-
-
D. Liu, Q. Dong, Detecting misused keys in wireless sensor networks, in: International Performance Computing and Communications Conference (IPCCC 2007), April 2007, pp. 272-280.
-
D. Liu, Q. Dong, Detecting misused keys in wireless sensor networks, in: International Performance Computing and Communications Conference (IPCCC 2007), April 2007, pp. 272-280.
-
-
-
-
11
-
-
3543056512
-
-
S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks, in: IEEE Symposium on Security and Privacy, Oakland, CA, 2004, pp. 260-272.
-
S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks, in: IEEE Symposium on Security and Privacy, Oakland, CA, 2004, pp. 260-272.
-
-
-
-
12
-
-
33845747795
-
-
H. Chan, A. Perrig, D. Song, Secure hierarchical in-network aggregation in sensor networks, in: ACM CCS'06, Alexandria, VA, 2006, pp. 278-287.
-
H. Chan, A. Perrig, D. Song, Secure hierarchical in-network aggregation in sensor networks, in: ACM CCS'06, Alexandria, VA, 2006, pp. 278-287.
-
-
-
-
13
-
-
33748089962
-
-
Y. Yang, X. Wang, S. Zhu, G. Cao, "SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in: ACM MOBIHOC'06, Florence, Italy, May 2006, pp. 356-367.
-
Y. Yang, X. Wang, S. Zhu, G. Cao, "SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in: ACM MOBIHOC'06, Florence, Italy, May 2006, pp. 356-367.
-
-
-
-
14
-
-
33144467903
-
-
D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE IPSN'05, Los Angeles, CA, 2005, pp. 99-106.
-
D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: IEEE IPSN'05, Los Angeles, CA, 2005, pp. 99-106.
-
-
-
-
15
-
-
33744548460
-
LAD: localization anomaly detection for wireless sensor networks
-
Du W., Fang L., and Ning P. LAD: localization anomaly detection for wireless sensor networks. J. Parallel Distrib. Comput. (JPDC) 66 7 (2006) 874-886
-
(2006)
J. Parallel Distrib. Comput. (JPDC)
, vol.66
, Issue.7
, pp. 874-886
-
-
Du, W.1
Fang, L.2
Ning, P.3
-
16
-
-
85081445075
-
-
TinyOS. Available from: .
-
TinyOS. Available from: .
-
-
-
-
18
-
-
84884730529
-
-
R. Blom, An optimal class of symmetric key generation schemes, Advance in Cryptography EUROCRYPT, 1985 Lecture Notes in Computer Science, vol. 209, Springer-Verlag, 198, pp. 335-338.
-
R. Blom, An optimal class of symmetric key generation schemes, Advance in Cryptography EUROCRYPT, 1985 Lecture Notes in Computer Science, vol. 209, Springer-Verlag, 198, pp. 335-338.
-
-
-
-
20
-
-
56749103027
-
-
B. Song, C.J. Mitchell, RFID authentication protocol for low-cost tags, in: ACM Conference on Wireless Network Security (WiSec'08), Alexandria, VA, 2008.
-
B. Song, C.J. Mitchell, RFID authentication protocol for low-cost tags, in: ACM Conference on Wireless Network Security (WiSec'08), Alexandria, VA, 2008.
-
-
-
|