Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks (Englisch)
Freier Zugriff
- Neue Suche nach: Yang, Yanjiang
- Neue Suche nach: Zhou, Jianying
- Neue Suche nach: Deng, Robert H.
- Neue Suche nach: Bao, Feng
- Neue Suche nach: Yang, Yanjiang
- Neue Suche nach: Zhou, Jianying
- Neue Suche nach: Deng, Robert H.
- Neue Suche nach: Bao, Feng
In:
Information and Communications Security
5
;
135-149
;
2009
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
-
Beteiligte:Yang, Yanjiang ( Autor:in ) / Zhou, Jianying ( Autor:in ) / Deng, Robert H. ( Autor:in ) / Bao, Feng ( Autor:in )
-
Erschienen in:Information and Communications Security , 5 ; 135-149Lecture Notes in Computer Science ; 5927, 5 ; 135-149
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
How to Steal a Botnet and What Can Happen When You DoKemmerer, Richard A. et al. | 2009
- 2
-
A User-Mode-Kernel-Mode Co-operative Architecture for Trustable ComputingMao, Wenbo et al. | 2009
- 3
-
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier TransformLi, Yang / Sakiyama, Kazuo / Kawamura, Shinichi / Komano, Yuichi / Ohta, Kazuo et al. | 2009
- 17
-
Security Analysis of the GF-NLFSR Structure and Four-Cell Block CipherWu, Wenling / Zhang, Lei / Zhang, Liting / Zhang, Wentao et al. | 2009
- 32
-
The rakaposhi Stream CipherCid, Carlos / Kiyomoto, Shinsaku / Kurihara, Jun et al. | 2009
- 47
-
Design of Reliable and Secure Multipliers by Multilinear Arithmetic CodesWang, Zhen / Karpovsky, Mark / Sunar, Berk / Joshi, Ajay et al. | 2009
- 63
-
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded SystemsKoschuch, Manuel / Großschädl, Johann / Page, Dan / Grabher, Philipp / Hudler, Matthias / Krüger, Michael et al. | 2009
- 80
-
Online/Offline Ring Signature SchemeLiu, Joseph K. / Au, Man Ho / Susilo, Willy / Zhou, Jianying et al. | 2009
- 91
-
Policy-Controlled SignaturesThorncharoensri, Pairat / Susilo, Willy / Mu, Yi et al. | 2009
- 107
-
Public Key Encryption without Random Oracle Made Truly PracticalWei, Puwen / Wang, Xiaoyun / Zheng, Yuliang et al. | 2009
- 121
-
A Public-Key Traitor Tracing Scheme with an Optimal Transmission RateChen, Yi-Ruei / Tzeng, Wen-Guey et al. | 2009
- 135
-
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor NetworksYang, Yanjiang / Zhou, Jianying / Deng, Robert H. / Bao, Feng et al. | 2009
- 150
-
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply ChainsCai, Shaoying / Li, Tieyan / Ma, Changshe / Li, Yingjiu / Deng, Robert H. et al. | 2009
- 165
-
Biometric-Based Non-transferable Anonymous CredentialsBlanton, Marina / Hudelson, William M. P. et al. | 2009
- 181
-
Secure Remote Execution of Sequential ComputationsKarame, Ghassan O. / Strasser, Mario / Čapkun, Srdjan et al. | 2009
- 198
-
Architecture- and OS-Independent Binary-Level Dynamic Test GenerationLi, Gen / Lu, Kai / Zhang, Ying / Lu, Xicheng / Zhang, Wei et al. | 2009
- 211
-
Measuring Information Flow in Reactive ProcessesMu, Chunyan et al. | 2009
- 226
-
Trusted Isolation Environment: An Attestation Architecture with Usage Control ModelRuan, Anbang / Shen, Qingni / Gu, Liang / Wang, Li / Shi, Lei / Yang, Yahui / Chen, Zhong et al. | 2009
- 241
-
Denial-of-Service Attacks on Host-Based Generic UnpackersLiu, Limin / Ming, Jiang / Wang, Zhi / Gao, Debin / Jia, Chunfu et al. | 2009
- 254
-
Predictive Pattern Matching for Scalable Network Intrusion DetectionVespa, Lucas / Mathew, Mini / Weng, Ning et al. | 2009
- 268
-
Deterministic Finite Automata Characterization for Memory-Based Pattern MatchingVespa, Lucas / Weng, Ning et al. | 2009
- 283
-
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection ThresholdXia, Zhengmin / Lu, Songnian / Li, Jianhua / Zhang, Aixin et al. | 2009
- 293
-
User-Assisted Host-Based Detection of Outbound Malware TrafficXiong, Huijun / Malhotra, Prateek / Stefan, Deian / Wu, Chehai / Yao, Danfeng et al. | 2009
- 308
-
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community CompetenceOlsson, Tomas et al. | 2009
- 325
-
Using the (Open) Solaris Service Management Facility as a Building Block for System SecuritySchuba, Christoph et al. | 2009
- 336
-
IntFinder: Automatically Detecting Integer Bugs in x86 Binary ProgramChen, Ping / Han, Hao / Wang, Yi / Shen, Xiaobin / Yin, Xinchun / Mao, Bing / Xie, Li et al. | 2009
- 346
-
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]Singh, Gunmeet / Singh, Sarbjeet et al. | 2009
- 359
-
Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules MiningGe, Xin-Jing / Zhu, Jian-Ming et al. | 2009
- 370
-
GUC-Secure Join Operator in Distributed Relational DatabaseTian, Yuan / Zhang, Hao et al. | 2009
- 385
-
TSM-Trust: A Time-Cognition Based Computational Model for Trust DynamicsXu, Guangquan / Feng, Zhiyong / Li, Xiaohong / Wu, Hutong / Yu, Yongxin / Chen, Shizhan / Rao, Guozheng et al. | 2009
- 396
-
Bring Efficient Connotation Expressible Policies to Trust ManagementZhang, Yan / Zhai, Zhengde / Feng, Dengguo et al. | 2009
- 411
-
A User Trust-Based Collaborative Filtering Recommendation AlgorithmZhang, Fuzhi / Bai, Long / Gao, Feng et al. | 2009
- 425
-
Fingerprinting Attack on the Tor Anonymity SystemShi, Yi / Matsuura, Kanta et al. | 2009
- 439
-
Proactive Verifiable Linear Integer Secret Sharing SchemeMa, Chuangui / Ding, Xiaofei et al. | 2009
- 449
-
A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform ApproachFatemi, Mitra / Eghlidos, Taraneh / Aref, Mohammadreza et al. | 2009
- 459
-
Digital Audio Watermarking Technique Using Pseudo-Zernike MomentsWang, Xiangyang / Ma, Tianxiao / Niu, Panpan et al. | 2009
- 474
-
An Image Sanitizing Scheme Using Digital WatermarkingNoguchi, Masatoshi / Inuma, Manabu / Shigetomi, Rie / Imai, Hideki et al. | 2009
- 483
-
Adaptive and Composable Oblivious Transfer Protocols (Short Paper)Zhu, Huafei / Bao, Feng et al. | 2009
- 493
-
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data AggregationWang, Licheng / Wang, Lihua / Pan, Yun / Zhang, Zonghua / Yang, Yixian et al. | 2009