-
1
-
-
62949118177
-
-
E. H. (Jr) Callaway. Wireless Sensor Networks, Architectures and Protocols. Auerbach Publications, 2003.
-
E. H. (Jr) Callaway. Wireless Sensor Networks, Architectures and Protocols. Auerbach Publications, 2003.
-
-
-
-
2
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
4
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
ACM Press, pp
-
C. Karlof, N. Sastry, and D. Wagner. "TinySec: a link layer security architecture for wireless sensor networks," in Proc. International Conf. Embedded Networked Sensor Syst., ACM Press, pp. 162-175, 2004.
-
(2004)
Proc. International Conf. Embedded Networked Sensor Syst
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
5
-
-
62949179479
-
-
Online] Available
-
"RSA SecureID, "Secure identity." [Online] Available: http://www.rsa.com/node.aspx?id=1156.
-
Secure identity
-
-
-
6
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M. L. Das, A. Saxena, and V. P. Gulati. "A dynamic ID-based remote user authentication scheme," IEEE Trans. Consumer Electron., vol. 50, no. 2, pp. 629-631, 2004.
-
(2004)
IEEE Trans. Consumer Electron
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
7
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, "TinyPK: securing sensor networks with public key technology," in Proc. ACM Workshop Security of Ad Hoc Sensor Networks, pp. 59-64, 2004.
-
(2004)
Proc. ACM Workshop Security of Ad Hoc Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
8
-
-
62949177571
-
-
Z. Benenson, F. Gartner, and D. Kesdogan. User authentication in sensor networks, in Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik, 2004.
-
Z. Benenson, F. Gartner, and D. Kesdogan. "User authentication in sensor networks," in Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik, 2004.
-
-
-
-
9
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K. Wong, Y. Zheng, J. Cao, and S. Wang. "A dynamic user authentication scheme for wireless sensor networks," in Proc. IEEE International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing, IEEE Computer Society, pp. 244-251, 2006.
-
(2006)
Proc. IEEE International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing, IEEE Computer Society
, pp. 244-251
-
-
Wong, K.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
10
-
-
62949131293
-
-
IEEE Standards for 802.15.4; Part 15.4: Wireless medium access control and physical layer specifications for low-rate wireless personal area networks, 2003.
-
IEEE Standards for 802.15.4; Part 15.4: "Wireless medium access control and physical layer specifications for low-rate wireless personal area networks," 2003.
-
-
-
-
12
-
-
84939573910
-
Differential power analysis
-
Proc. Advances Cryptology, Springer-Verlag
-
P. C. Kocher, J. Jaffe, and B. Jun. "Differential power analysis," in Proc. Advances Cryptology, Springer-Verlag, LNCS 1666, pp. 388-397, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
13
-
-
0020720357
-
On the security of public-key protocols
-
D. Dolev and A. C. Yao. "On the security of public-key protocols," IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198-208, 1983.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
14
-
-
33745738746
-
One-time sensors: A novel concept to mitigate node-capture attacks
-
Proc. Workshop Security Privacy in Ad-hoc Sensor Networks
-
K. Bicakci, C. Gamage, B. Crispo, and A. S. Tanenbaum. "One-time sensors: a novel concept to mitigate node-capture attacks," in Proc. Workshop Security Privacy in Ad-hoc Sensor Networks, LNCS 3813, pp. 80-90, 2005.
-
(2005)
LNCS
, vol.3813
, pp. 80-90
-
-
Bicakci, K.1
Gamage, C.2
Crispo, B.3
Tanenbaum, A.S.4
|