Image Processing Reference
In-Depth Information
and Communications (ISCC')
. Washington, DC: IEEE Computer Society, . ISBN
---, pp. -.
[GNY] Gong, L.; Needham, R. M.; Yahalom, R.: Reasoning about belief in cryptographic protocols.
In:
SymposiumonResearchinSecurityandPrivacy
. IEEE Computer Society, IEEE Computer
Society Press, May , pp. -.
[GSW] Girao, J.; Schneider, M.; Westhoff, D.: CDA: Concealed data aggregation in wireless sensor
networks. In:
ACM Workshop on Wireless Security
. Philadelphia, PA, October . Poster
presentation.
[HD] Huang, C.; Du, D.: New constructions on broadcast encryption and key pre-distribution
schemes. In:
Proceedings of the IEEE INFOCOM'
, . Miami, FL.
[HK] Hwang, J.; Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor net-
works. In:
SASN':ProceedingsofthendACMWorkshoponSecurityofAdHocandSensor
Networks
. New York: ACM, . ISBN ---, pp. -.
[HLN
+
] He, W; Liu, X.; Nguyen, H.; Nahrstedt, K.; Abdelzaher, T. T.: PDA: Privacy-preserving
data aggregation in wireless sensor networks. In:
Proceedings of the th IEEE International
Conference on Computer Communications (INFOCOM')
,.Anchorage,AK,ISSN
-X, pp. -.
[HMNS]
Haller, N.; Metz, C.; Nesser, P.; Straw, M.:
AOne-TimePasswordSystem
.February.RFC
, IETF, Status: Draft Standard, ftp://ftp.internic.net/rfc/rfc.txt
[HPJ]
Hu,Y.;Perrig,A.;Johnson,D.:
Wormhole Detection in Wireless Ad Hoc Networks
.July.
Technical Report TR-, Rice University, Houston, TX.
[HWM
+
]
Hegland, A. M.; Winjum, E.; Mjolsnes, S.F.; Rong, C.; Kure, O.; Spilling, P.: A survey of
key management in ad hoc networks.
Communications Surveys and Tutorials
(), (),
-. IEEE.
[Jos]
Domingo i Ferrer, J.: A new privacy homomorphism and applications.
Information Process-
ing Letters
(), (), -.
[KWa]
Karl, H.; Willig, A.:
A Short Survey of Wireless Sensor Networks
..TKNTechnicalReport
Series, TKN--, Technical University Berlin, Germany.
[KWb]
Karlof, C.; Wagner, D.: Secure routing in wireless sensor networks: Attacks and counter-
measures.
AdHoc Networks Journal
(-), (), -.
[KW]
Karl, H.; Willig, A.:
Protocols and Architectures for Wireless Sensor Networks
.Chichester,
U.K.: John Wiley & Sons, . ISBN .
[KY]
Kaliski, B. S.; Yin, Y. L.:
On the Security of the RC Encryption Algorithm
..RSA
Laboratories Technical Report, TR-, Version ..
[LN]
Liu, D.; Ning, P.: Establishing pairwise keys in distributed sensor networks. In:
Proceedings
of the th ACM Conference on Computer and Communications Security (CCS ')
,.
Washington, DC.
[LN]
Liu, D.; Ning, P.: Multilevel μTESLA: Broadcast authentication for distributed sensor
networks.
Transactions on Embedded Computing Systems
(), (), -. ISSN
-.
[MOV]
Menezes, A.; van Oorschot, P.; Vanstone, S.:
Handbook of Applied Cryptography
.BocaRaton,
FL: CRC Press LLC, .
[MS]
MacWilliams, F. J.; Sloane, N. J. A.:
The Theory of Error-Correcting Codes
.Amsterdamthe
Netherlands: Elsevier Science Publishing Company, Inc., .
[OR]
Otway, D.; Rees, O.: Efficient and timely mutual authentication.
Operating Systems Review
(), (), -.
[PLGP]
Parno,B.;Luk,M.;Gaustad,E.;Perrig,A.:Securesensornetworkrouting:Aclean-slate
approach. In:
Conference on Future Networking Technologies (CoNEXT)
, . Lisboa,
Portugal.