Image Processing Reference
In-Depth Information
[PST + ] Perrig,A.;Szewcyk,R.;Tygar,J.;Wen,V.;Culler,D.:SPINS:Securityprotocolsforsensor
networks. Wireless Networks (),-.
[PT] Perrig, A.; Tygar, J. D.: Secure Broadcast Communication in Wired and Wireless Networks .
Norwell, MA: Kluwer Academic Publishers, .
[RAD] Rivest, R. L.; Adleman, L.; Dertouzos, M. L.: On data banks and privacy homomorphisms.
Foundations of Secure Computation . Academic Press, (), -.
[RKP] Ren, S. Q.; Kim, D. S.; Park, J. S.: A secure data aggregation scheme for wireless sensor
networks. In: ISPA  Workshops , Springer, . Lecture Notes in Computer Science,
Vol. , pp. -.
[RSA] Rivest, R.; Shamir, A.; Adleman, L.: A method for obtaining digital signatures and public
key cryptosystems. Communications of the ACM (), February , -.
[RZL] Roman, R.; Zhou, J.; Lopez, J.: Applying intrusion detection systems to wireless sensor net-
works. In: Proceedings of the rd Consumer Communications and Networking Conference
(CCNC') ,.LasVegas,NV.
[Sch] Schäfer, G.: Security in Fixed and Wireless Networks . New York: John Wiley & Sons, .
[Sch] Schaefer, G.: Sensor network security. In: Zurawski, R. (ed.): he Embedded Systems Hand-
book .BocaRaton,FL:CRCPress,,pp..-..
[SMR + ] da Silva, A. P. R.; Martins, M. H. T.; Rocha, B. P. S.; Loureiro, A. A. F.; Ruiz, L. B.; Wong,
H. C.: Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the
st ACM International Workshop on Quality of Service and Security in Wireless and Mobile
Networks (QSWinet') .NewYork:ACM,.ISBN---,pp.-.
[TAL]
Tuomas Aura, P. N.; Leiwo, J.: DOS-resistant authentication with client puzzles. In: Proceed-
ings of the Security Protocols Workshop  , Springer, . Cambridge, U.K., April ,
Lecture Notes in Computer Science (LNCS).
[Wag]
Wagner, D.: Cryptanalysis of an algebraic privacy homomorphism. In: Proceedings of the
Sixth Information Security Conference (ISC') , Springer, October . Lecture Notes in
Computer Science, Vol. .
[Wag]
Wagner, D.: Resilient aggregation in sensor networks. In: Proceedings of the nd ACM Work-
shop on Security of Ad Hoc and Sensor Networks (SASN') , New York: ACM Press, ,
pp. -.
[Woo]
Wood, A.: Security in Sensor Networks . . Sensor Networks Seminar, University of
Virginia, VA.
[WS]
Wood, A.; Stankovic, J.: Denial of service in sensor networks. IEEE Computer  (October,
), -.
[ZSJ]
Zhu, S.; Setia, S.; Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed
sensor networks. In: Proceedings of CCS' , . Washington, DC.
Search WWH ::




Custom Search