Image Processing Reference
In-Depth Information
and Communications (ISCC') . Washington, DC: IEEE Computer Society, . ISBN
---, pp. -.
[GNY] Gong, L.; Needham, R. M.; Yahalom, R.: Reasoning about belief in cryptographic protocols.
In: SymposiumonResearchinSecurityandPrivacy . IEEE Computer Society, IEEE Computer
Society Press, May , pp. -.
[GSW] Girao, J.; Schneider, M.; Westhoff, D.: CDA: Concealed data aggregation in wireless sensor
networks. In: ACM Workshop on Wireless Security . Philadelphia, PA, October . Poster
presentation.
[HD] Huang, C.; Du, D.: New constructions on broadcast encryption and key pre-distribution
schemes. In: Proceedings of the IEEE INFOCOM' , . Miami, FL.
[HK] Hwang, J.; Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor net-
works. In: SASN':ProceedingsofthendACMWorkshoponSecurityofAdHocandSensor
Networks . New York: ACM, . ISBN ---, pp. -.
[HLN + ] He, W; Liu, X.; Nguyen, H.; Nahrstedt, K.; Abdelzaher, T. T.: PDA: Privacy-preserving
data aggregation in wireless sensor networks. In: Proceedings of the th IEEE International
Conference on Computer Communications (INFOCOM') ,.Anchorage,AK,ISSN
-X, pp. -.
[HMNS]
Haller, N.; Metz, C.; Nesser, P.; Straw, M.: AOne-TimePasswordSystem .February.RFC
, IETF, Status: Draft Standard, ftp://ftp.internic.net/rfc/rfc.txt
[HPJ]
Hu,Y.;Perrig,A.;Johnson,D.: Wormhole Detection in Wireless Ad Hoc Networks .July.
Technical Report TR-, Rice University, Houston, TX.
[HWM + ]
Hegland, A. M.; Winjum, E.; Mjolsnes, S.F.; Rong, C.; Kure, O.; Spilling, P.: A survey of
key management in ad hoc networks. Communications Surveys and Tutorials (), (),
-. IEEE.
[Jos]
Domingo i Ferrer, J.: A new privacy homomorphism and applications. Information Process-
ing Letters (), (), -.
[KWa]
Karl, H.; Willig, A.: A Short Survey of Wireless Sensor Networks ..TKNTechnicalReport
Series, TKN--, Technical University Berlin, Germany.
[KWb]
Karlof, C.; Wagner, D.: Secure routing in wireless sensor networks: Attacks and counter-
measures. AdHoc Networks Journal (-), (), -.
[KW]
Karl, H.; Willig, A.: Protocols and Architectures for Wireless Sensor Networks .Chichester,
U.K.: John Wiley & Sons, . ISBN .
[KY]
Kaliski, B. S.; Yin, Y. L.: On the Security of the RC Encryption Algorithm ..RSA
Laboratories Technical Report, TR-, Version ..
[LN]
Liu, D.; Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings
of the th ACM Conference on Computer and Communications Security (CCS ') ,.
Washington, DC.
[LN]
Liu, D.; Ning, P.: Multilevel μTESLA: Broadcast authentication for distributed sensor
networks. Transactions on Embedded Computing Systems (), (), -. ISSN
-.
[MOV]
Menezes, A.; van Oorschot, P.; Vanstone, S.: Handbook of Applied Cryptography .BocaRaton,
FL: CRC Press LLC, .
[MS]
MacWilliams, F. J.; Sloane, N. J. A.: The Theory of Error-Correcting Codes .Amsterdamthe
Netherlands: Elsevier Science Publishing Company, Inc., .
[OR]
Otway, D.; Rees, O.: Efficient and timely mutual authentication. Operating Systems Review
(), (), -.
[PLGP]
Parno,B.;Luk,M.;Gaustad,E.;Perrig,A.:Securesensornetworkrouting:Aclean-slate
approach. In: Conference on Future Networking Technologies (CoNEXT) , . Lisboa,
Portugal.
Search WWH ::




Custom Search