| Tài liệu tham khảo |
Loại |
Chi tiết |
| [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102–114, August 2002 |
Sách, tạp chí |
| Tiêu đề: |
IEEE Communications Magazine |
|
| [2] P. Albers and O. Camp. Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches. In First International Workshop on Wireless Information Systems, 4th International Conference on Enterprise Information Systems, 2002 |
Sách, tạp chí |
| Tiêu đề: |
First InternationalWorkshop on Wireless Information Systems, 4th International Conference onEnterprise Information Systems |
|
| [3] R. Anderson and M. Kuhn. Tamper resistance - a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, 1996 |
Sách, tạp chí |
| Tiêu đề: |
TheSecond USENIX Workshop on Electronic Commerce Proceedings |
|
| [4] R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In IWSP: International Workshop on Security Protocols, LNCS, 1997 |
Sách, tạp chí |
| Tiêu đề: |
IWSP: International Workshop on Security Protocols, LNCS |
|
| [5] T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In Revised Papers from the 8th International Workshop on Security Protocols, pages 170–177. Springer-Verlag, 2001 |
Sách, tạp chí |
| Tiêu đề: |
Revised Papers from the 8th International Workshop on SecurityProtocols |
|
| [6] A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing.IEEE Pervasive Computing, 2(1):46–55, 2003 |
Sách, tạp chí |
| Tiêu đề: |
IEEE Pervasive Computing |
|
| [7] P. Bose, P. Morin, I. Stojmenovi´c;, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wirel. Netw., 7(6):609–616, 2001 |
Sách, tạp chí |
|
| [8] D. Braginsky and D. Estrin. Rumor routing algorthim for sensor networks. In WSNA ’02: Proceedings of the 1st ACM international workshop on Wireless |
Sách, tạp chí |
| Tiêu đề: |
Rumor routing algorithm for sensor networks |
| Tác giả: |
D. Braginsky, D. Estrin |
| Nhà XB: |
Proceedings of the 1st ACM international workshop on Wireless |
| Năm: |
2002 |
|
| [9] P. Brutch and C. Ko. Challenges in intrusion detection for wireless ad-hoc networks. In 2003 Symposium on Applications and the Internet Workshops (SAINT’03 Workshops), 2003 |
Sách, tạp chí |
| Tiêu đề: |
2003 Symposium on Applications and the Internet Workshops(SAINT’03 Workshops) |
|
| [11] H. Chan and A. Perrig. Security and privacy in sensor networks. IEEE Com- puter Magazine, pages 103–105, 2003 2003 |
Sách, tạp chí |
| Tiêu đề: |
IEEE Com-puter Magazine |
|
| [12] H. Chan and A. Perrig. Pike: Peer intermediaries for key establishment in sensor networks. In IEEE Infocom 2005, 2005 |
Sách, tạp chí |
| Tiêu đề: |
IEEE Infocom 2005 |
|
| [13] H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 197. IEEE Computer Society, 2003 |
Sách, tạp chí |
| Tiêu đề: |
Proceedings of the 2003 IEEE Symposium on Security andPrivacy |
|
| [15] J. Deng, R. Han, and S. Mishra. INSENS: intrusion-tolerant routing in wireless sensor networks. In Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado, 2002 |
Sách, tạp chí |
| Tiêu đề: |
Technical Report CU-CS-939-02, Department of ComputerScience, University of Colorado |
|
| [17] J. Deng, R. Han, and S. Mishra. Security, privacy, and fault tolerance in wireless sensor networks. Artech House, August 2005 |
Sách, tạp chí |
| Tiêu đề: |
Security, privacy, and fault tolerance inwireless sensor networks |
|
| [18] J. Douceur. The sybil attack. In Proc. of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), February 2002 |
Sách, tạp chí |
| Tiêu đề: |
Proc. of the 1st International Workshop onPeer-to-Peer Systems (IPTPS’02) |
|
| [19] W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In CCS ’03: Proceedings of the 10th ACM conference on Computer and communications security, pages 42–51, New York, NY, USA, 2003. ACM Press |
Sách, tạp chí |
| Tiêu đề: |
A pairwise key pre-distribution scheme for wireless sensor networks |
| Tác giả: |
W. Du, J. Deng, Y. S. Han, P. K. Varshney |
| Nhà XB: |
ACM Press |
| Năm: |
2003 |
|
| [20] S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang.Framework for security and privacy in automotive telematics. In In 2nd ACM International Worksphop on Mobile Commerce, 2000 |
Sách, tạp chí |
| Tiêu đề: |
In 2nd ACMInternational Worksphop on Mobile Commerce |
|
| [21] L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 41–47. ACM Press, 2002 |
Sách, tạp chí |
| Tiêu đề: |
Proceedings of the 9th ACM conference on Computer andcommunications security |
|
| [22] D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar. Next century chal- lenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263–270, 1999 |
Sách, tạp chí |
| Tiêu đề: |
Mobile Computing andNetworking |
|
| [23] S. Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington DC, USA, 2004 |
Sách, tạp chí |
| Tiêu đề: |
Proceedings of the 2nd ACM workshop on Security of adhoc and sensor networks |
|