메뉴 건너뛰기




Volumn 294 PART 2, Issue , 2012, Pages 289-301

Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks

Author keywords

energy harvesting; security; wireless sensor networks

Indexed keywords

ADVERSARY MODELS; CYBER PHYSICALS; NEW SOLUTIONS; SCAVENGING ENERGY; SECURITY; SECURITY PROTOCOLS; SECURITY SOLUTIONS; SURROUNDING ENVIRONMENT;

EID: 84868091054     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-30567-2_24     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 1
    • 35048865382 scopus 로고    scopus 로고
    • Computationally Sound Mechanized Proofs of Correspondence Assertions
    • Venice, Italy
    • Blanchet, B.: Computationally Sound Mechanized Proofs of Correspondence Assertions. In: 20th IEEE Computer Security Foundations Symposium (CSF 2007), Venice, Italy, pp. 97-111 (2007)
    • (2007) 20th IEEE Computer Security Foundations Symposium (CSF 2007) , pp. 97-111
    • Blanchet, B.1
  • 2
    • 68249091950 scopus 로고    scopus 로고
    • Automatic Verification of Correspondences for Security Protocols
    • Blanchet, B.: Automatic Verification of Correspondences for Security Protocols. Journal of Computer Security 17(4), 363-434 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 5
    • 77956596618 scopus 로고    scopus 로고
    • Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
    • In: Dawar, A., Veith, H. (eds.), LNCS, Springer, Heidelberg
    • Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol. 6247, pp. 1-18. Springer, Heidelberg (2010)
    • (2010) CSL 2010 , vol.6247 , pp. 1-18
    • Basin, D.1    Cremers, C.2
  • 10
    • 78449273182 scopus 로고    scopus 로고
    • Accurate Modelling and Prediction of Energy Availability In Energy Harvesting Real-time Embedded Systems
    • Lu, J., Liu, S., Wu, Q., Qiu, Q.: Accurate modelling and prediction of energy availability in energy harvesting real-time embedded systems. In: 2010 International Green Computing Conference, pp. 469-476 (2010)
    • (2010) 2010 International Green Computing Conference , pp. 469-476
    • Lu, J.1    Liu, S.2    Wu, Q.3    Qiu, Q.4
  • 11
    • 78149394262 scopus 로고    scopus 로고
    • Main types of attacks in wireless sensor networks
    • 9th WSEAS International Conference on Multimedia, Internet & Video Technologies, SSIP 2009/MIV 2009, Stevens Point, Wisconsin, USA, World Scientific and Engineering Academy and Society (WSEAS)
    • Lupu, T.-G.: Main types of attacks in wireless sensor networks. In: Proceedings of the 9th WSEAS International Conference on Signal, Speech and Image Processing, and 9th WSEAS International Conference on Multimedia, Internet & Video Technologies, SSIP 2009/MIV 2009, Stevens Point, Wisconsin, USA, pp. 180-185. World Scientific and Engineering Academy and Society (WSEAS) (2009)
    • (2009) Proceedings of the 9th WSEAS International Conference On Signal, Speech and Image Processing , pp. 180-185
    • Lupu, T.-G.1
  • 15
  • 18
    • 84880476481 scopus 로고    scopus 로고
    • (ed.), LNCS, Springer, Heidelberg
    • Won, D. (ed.): ICISC 2000. LNCS, vol. 2015. Springer, Heidelberg (2001)
    • (2001) ICISC 2000 , vol.2015
    • Won, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.