-
1
-
-
80052854156
-
Securing the internet of things
-
Sep.
-
R. Roman, P. Najera, and J. Lpoez, "Securing the internet of things, " Comput., vol. 44, no. 9, pp. 51-58, Sep. 2011.
-
(2011)
Comput.
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lpoez, J.3
-
3
-
-
74949143896
-
Internet of things-new security and privacy challenges
-
Jan.
-
R. H. Weber, "Internet of things-New security and privacy challenges, " Comput. Law Security Rev., vol. 26, no. 1, pp. 23-30, Jan. 2010.
-
(2010)
Comput. Law Security Rev.
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
4
-
-
79959280293
-
Internet of things: Applications and challenges in technology and standardization
-
May
-
D. Bandyopadhyay and J. Sen, "Internet of things: Applications and challenges in technology and standardization, " Wireless Pers. Commun., vol. 58, no. 1, pp. 49-69, May 2011.
-
(2011)
Wireless Pers. Commun.
, vol.58
, Issue.1
, pp. 49-69
-
-
Bandyopadhyay, D.1
Sen, J.2
-
5
-
-
80455141504
-
A novel secure architecture for the internet of things
-
D. Chen, G. Chang, L. Jin, X. Ren, J. Li, and F. Li, "A novel secure architecture for the internet of things, " in Proc. 5th Int. Conf. Genetic Evol. Comput., 2011, pp. 311-314.
-
(2011)
Proc. 5th Int. Conf. Genetic Evol. Comput.
, pp. 311-314
-
-
Chen, D.1
Chang, G.2
Jin, L.3
Ren, X.4
Li, J.5
Li, F.6
-
6
-
-
84879054217
-
Adopting the internet of things technologies in environmental management in south africa
-
Apr.
-
N. Dlodlo, "Adopting the internet of things technologies in environmental management in South Africa, " in Proc. Int. Conf. Environ. Sci. Eng., vol. 3. Apr. 2012, pp. 45-55.
-
(2012)
Proc. Int. Conf. Environ. Sci. Eng.
, vol.3
, pp. 45-55
-
-
Dlodlo, N.1
-
7
-
-
84863061158
-
Research on mobile digital health system based on internet of things
-
New York, NY, USA: Springer-Verlag
-
J. Li, X. Wu, and H. Chen, "Research on mobile digital health system based on internet of things, " in Electrical Power Systems and Computers (Lecture Notes in Electrical Engineering), vol. 99. New York, NY, USA: Springer-Verlag, 2011, pp. 495-502.
-
(2011)
Electrical Power Systems and Computers (Lecture Notes in Electrical Engineering)
, vol.99
, pp. 495-502
-
-
Li, J.1
Wu, X.2
Chen, H.3
-
8
-
-
84877917534
-
Internet of things (iot) services: Architecture and its application in e-commerce
-
Jul.-Sep.
-
X. Shang, R. Zhang, and Y. Chen, "Internet of things (IoT) services: Architecture and its application in E-commerce, " J. Electron. Commerce Org., vol. 10, no. 3, pp. 44-55, Jul.-Sep. 2012.
-
(2012)
J. Electron. Commerce Org.
, vol.10
, Issue.3
, pp. 44-55
-
-
Shang, X.1
Zhang, R.2
Chen, Y.3
-
9
-
-
34547466172
-
Seven cardinal properties of sensor network broadcast authentication
-
DOI 10.1145/1180345.1180364, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
M. Luk, A. Perrig, and B. Whillock, "Seven cardinal properties of sensor network broadcast authentication, " in Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw., 2006, pp. 147-156. (Pubitemid 47168566)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 147-156
-
-
Luk, M.1
Perrig, A.2
Whillock, B.3
-
11
-
-
84857045957
-
Accelerating signature-based broadcast authentication for wireless sensor networks
-
Jun.
-
X. Fan and G. Gong, "Accelerating signature-based broadcast authentication for wireless sensor networks, " Ad Hoc Netw., vol. 10, no. 4, pp. 723-736, Jun. 2012.
-
(2012)
Ad Hoc Netw.
, vol.10
, Issue.4
, pp. 723-736
-
-
Fan, X.1
Gong, G.2
-
12
-
-
34547488838
-
Lower bounds for multicast message authentication
-
D. Boneh, G. Durfee, and M. Franklin, "Lower bounds for multicast message authentication, " in Proc. Adv. Cryptol., 2001, pp. 434-450.
-
(2001)
Proc. Adv. Cryptol.
, pp. 434-450
-
-
Boneh, D.1
Durfee, G.2
Franklin, M.3
-
13
-
-
39049094066
-
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.10.017, PII S0140366407004239
-
X. Cao, W. Kou, L. Dang, and B. Zhao, "IMBAS: Identity-based multiuser broadcast authentication in wireless sensor networks, " Comput. Commun., vol. 31, no. 4, pp. 659-67, 2008. (Pubitemid 351248940)
-
(2008)
Computer Communications
, vol.31
, Issue.4
, pp. 659-667
-
-
Cao, X.1
Kou, W.2
Dang, L.3
Zhao, B.4
-
14
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004
-
D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, " in Proc. 1st Annu. IEEE Commun. Soc. Conf. Sensor Ad Hoc Commun. Netw., Oct. 2004, pp. 71-80. (Pubitemid 40789266)
-
(2004)
2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
15
-
-
70350230005
-
Multi-user broadcast authentication in wireless sensor networks
-
Oct.
-
K. Ren, S. Yu, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks, " IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4554-4564, Oct. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.8
, pp. 4554-4564
-
-
Ren, K.1
Yu, S.2
Lou, W.3
Zhang, Y.4
-
16
-
-
70349170503
-
Lightweight broadcast authentication protocols reconsidered
-
S. Yamakawa, Y. Cui, K. Kobara, and H. Imai, "Lightweight broadcast authentication protocols reconsidered, " in Proc. IEEE Wireless Commun. Netw. Conf., Apr. 2009, pp. 3076-3081.
-
(2009)
Proc. IEEE Wireless Commun. Netw. Conf., Apr.
, pp. 3076-3081
-
-
Yamakawa, S.1
Cui, Y.2
Kobara, K.3
Imai, H.4
-
17
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
DOI 10.1109/MOBIQUITOUS.2005.49, 1540993, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks, " in Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst., Netw. Services, Jul. 2005, pp. 118-129. (Pubitemid 44523270)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 118-129
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
18
-
-
35048876343
-
Security proofs for identity-based identification and signature schemes
-
M. Bellare, C. Namprempre, and G. Neven, "Security proofs for identity-based identification and signature schemes, " in Proc. Adv. Cryptol., vol. 3027. 2004, pp. 268-286.
-
(2004)
Proc. Adv. Cryptol.
, vol.3027
, pp. 268-286
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
19
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks, " in Proc. 7th Annu. ACM Int. Conf. Mobile Comput. Netw., Jul. 2001, pp. 189-199. (Pubitemid 33006715)
-
(2001)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
36248988077
-
On broadcast authentication in wireless sensor networks
-
DOI 10.1109/TWC.2007.060255
-
K. Ren, K. Zeng, W. Lou, and P. J. Moran, "On broadcast authentication in wireless sensor networks, " IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, Nov. 2007. (Pubitemid 350121763)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.11
, pp. 4136-4144
-
-
Ren, K.1
Lou, W.2
Zeng, K.3
Moran, P.J.4
-
21
-
-
85000276942
-
Multi-level μtesla: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multi-level μTESLA: Broadcast authentication for distributed sensor networks, " ACM Trans. Embedded Comput. Syst., vol. 3, no. 4, pp. 800-836, 2004.
-
(2004)
ACM Trans. Embedded Comput. Syst.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
22
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
DOI 10.1109/MOBIQUITOUS.2005.49, 1540993, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks, " in Proc. MobiQuitous, 2005, pp. 118-129. (Pubitemid 44523270)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 118-129
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
23
-
-
44349158878
-
Confidential and secure broadcast in wireless sensor networks
-
J. Shaheen, D. Ostry, V. Sivaraman, and S. Jha, "Confidential and secure broadcast in wireless sensor networks, " in Proc. 18th Int. Symp. Pers., Indoor, Mobile Radio Commun., 2007, pp. 1-5.
-
(2007)
Proc. 18th Int. Symp. Pers., Indoor, Mobile Radio Commun.
, pp. 1-5
-
-
Shaheen, J.1
Ostry, D.2
Sivaraman, V.3
Jha, S.4
-
24
-
-
56749151138
-
Pre-authentication filters: Providing dos resistance for signature-based broadcast authentication in wireless sensor networks
-
Q. Dong, D. Liu, and P. Ning, "Pre-authentication filters: Providing DoS resistance for signature-based broadcast authentication in wireless sensor networks, " in Proc. 1st ACM Conf. Wireless Netw. Security, 2008, pp. 2-12.
-
(2008)
Proc. 1st ACM Conf. Wireless Netw. Security
, pp. 2-12
-
-
Dong, Q.1
Liu, D.2
Ning, P.3
-
25
-
-
41849094781
-
Mitigate dos attacks against broadcast authentication in wireless sensor networks
-
P. Ning, A. Liu, and W. Du, "Mitigate DOS attacks against broadcast authentication in wireless sensor networks, " ACM Trans. Sensor Netw., vol. 4, no. 1, pp. 1:1-1:35, 2008.
-
(2008)
ACM Trans. Sensor Netw.
, vol.4
, Issue.1
, pp. 11-135
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
26
-
-
78650785758
-
-
T. Wu, Y. Cui, B. Kusy, A. Ledeczi, J. Sallai, N. Skirvin, J. Werner, and Y. Xue. (2007) A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks [Online]. Available: http://www.stanford.edu/~kusy/pubs/ntms07-wu-fast.pdf
-
(2007)
A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks [Online]
-
-
Wu, T.1
Cui, Y.2
Kusy, B.3
Ledeczi, A.4
Sallai, J.5
Skirvin, N.6
Werner, J.7
Xue, Y.8
-
27
-
-
33749415562
-
Message and its origin authentication protocol for data aggregation in sensor networks
-
Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings
-
H. Lee, D. Nyang, and J. Song, "Message and its origin authentication protocol for data aggregation in sensor networks, " in Proc. Emerg. Direct. Embedded Ubiquitous Comput., 2006, pp. 281-290. (Pubitemid 44503062)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4097 LNCS
, pp. 281-290
-
-
Lee, H.1
Nyang, D.2
Song, J.3
-
29
-
-
34247325635
-
An efficient broadcast authentication scheme in wireless sensor networks
-
DOI 10.1145/1128817.1128864, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
S. Chang, S. Shieh, W. Lin, and C.-M. Hsieh, "An efficient broadcast authentication scheme in wireless sensor networks, " in Proc. ACM Symp. Inf., Comput. Commun. Security, 2006, pp. 311-320. (Pubitemid 46644749)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 311-320
-
-
Chang, S.-M.1
Shieh, S.2
Lin, W.W.3
Hsieh, C.-M.4
-
30
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
R. Merkle, "A digital signature based on a conventional encryption function, " in Proc. Adv. Cryptol., 1988, pp. 369-378.
-
(1988)
Proc. Adv. Cryptol.
, pp. 369-378
-
-
Merkle, R.1
-
31
-
-
84947431932
-
Better than biba: Short one-time signatures with fast signing and verifying
-
Jul.
-
L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying, " in Proc. 7th Australasian Conf., Jul. 2002, pp. 144-153.
-
(2002)
Proc. 7th Australasian Conf
, pp. 144-153
-
-
Reyzin, L.1
Reyzin, N.2
-
33
-
-
0002809150
-
One-way accumulators: A decentralized alternative to digital signatures
-
J. Benaloh and M. de Mare, "One-way accumulators: A decentralized alternative to digital signatures, " in Proc. Adv. Cryptol., 1993, pp. 274-285.
-
(1993)
Proc. Adv. Cryptol.
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
34
-
-
78650774939
-
Broadcast authentication algorithm for wireless sensor networks
-
Nov.
-
X. Yao, X. Zheng, and X. Zhou, "Broadcast authentication algorithm for wireless sensor networks, " J. China Inst. Commun., vol. 31, no. 11, pp. 49-55, Nov. 2010.
-
(2010)
J. China Inst. Commun.
, vol.31
, Issue.11
, pp. 49-55
-
-
Yao, X.1
Zheng, X.2
Zhou, X.3
|