A Hash Chains Based Key Management Scheme for Wireless Sensor Networks (Englisch)
- Neue Suche nach: Zhao, Huawei
- Neue Suche nach: Qin, Jing
- Neue Suche nach: Shu, Minglei
- Neue Suche nach: Hu, Jiankun
- Neue Suche nach: Zhao, Huawei
- Neue Suche nach: Qin, Jing
- Neue Suche nach: Shu, Minglei
- Neue Suche nach: Hu, Jiankun
In:
CSS, Cyberspace Safety and Security. International Symposium, 4
;
296-308
;
2012
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A Hash Chains Based Key Management Scheme for Wireless Sensor Networks
-
Beteiligte:Zhao, Huawei ( Autor:in ) / Qin, Jing ( Autor:in ) / Shu, Minglei ( Autor:in ) / Hu, Jiankun ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 7672 ; 296-308
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2012
-
Format / Umfang:13 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
M-Identity and Its Authentication Protocol for Secure Mobile Commerce ApplicationsHan, F. / van Schyndel, R. et al. | 2012
- 11
-
SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS DevicesSrinivasan, A. / Wu, J. et al. | 2012
- 21
-
Protection Aspects of Iconic Passwords on Mobile DevicesBraga, A.M. / Cividanes, R. / Avila, I. / Tambascia, C. et al. | 2012
- 33
-
Detecting Control Flow in Smarphones: Combining Static and Dynamic AnalysesGraa, M. / Cuppens-Boulahia, N. / Cuppens, F. / Cavalli, A. et al. | 2012
- 48
-
A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and FilteringAbawajy, J. / Kelarev, A. et al. | 2012
- 57
-
Chattering-Free Terminal Sliding-Mode Observer for Anomaly DetectionFeng, Y. / Wang, B. / Han, F. / Yu, X. / Tari, Z. et al. | 2012
- 66
-
Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA)Watters, P.A. / Phair, N. et al. | 2012
- 77
-
Improving Content Availability in the I2P Anonymous File-Sharing EnvironmentTimpanaro, J.P. / Chrisment, I. / Festor, O. et al. | 2012
- 93
-
V2GPriv: Vehicle-to-Grid Privacy in the Smart GridStegelmann, M. / Kesdogan, D. et al. | 2012
- 108
-
A Secure Architecture for Smart Meter SystemsAngermeier, D. / Bottinger, K. / Ibing, A. / Schuster, D. / Stumpf, F. / Wacker, D. et al. | 2012
- 123
-
A Novel Identity-Based Key Management and Encryption Scheme for Distributed SystemYang, G. / Zhou, Q. / Xu, X. / Xu, J. / Rong, C. et al. | 2012
- 139
-
An Anomaly Based Approach for HID Attack Detection Using Keystroke DynamicsBarbhuiya, F.A. / Saikia, T. / Nandi, S. et al. | 2012
- 153
-
Robust Authentication of Public Access Points Using Digital Certificates - A Novel ApproachSrinivasan, A. / Chennupati, L. et al. | 2012
- 165
-
A General Transformation from KP-ABE to Searchable EncryptionFei, H. / Jing, Q. / Huawei, Z. / Jiankun, H. et al. | 2012
- 179
-
Supporting Security and Consistency for Cloud DatabaseFerretti, L. / Colajanni, M. / Marchetti, M. et al. | 2012
- 194
-
Proxy Re-encryption in a Privacy-Preserving Cloud Computing DRM SchemePetrlic, R. et al. | 2012
- 212
-
Collaborative Behavior Visualization and Its Detection by Observing Darknet TrafficAkimoto, S. / Hori, Y. / Sakurai, K. et al. | 2012
- 227
-
SSH - Somewhat Secure HostValli, C. et al. | 2012
- 236
-
Physical Access Control Administration Using Building Information ModelsSkandhakumar, N. / Salim, F. / Reid, J. / Dawson, E. et al. | 2012
- 251
-
Multiple Factors Based Evaluation of Fingerprint Images QualityYang, Y. / Zhang, Z. / Han, F. / Lin, K. et al. | 2012
- 265
-
A Leakage-Resilient Zero Knowledge Proof for Lattice ProblemLiu, Y. / Li, H. / Niu, Q. et al. | 2012
- 279
-
MDSE@R: Model-Driven Security Engineering at RuntimeAlmorsy, M. / Grundy, J. / Ibrahim, A.S. et al. | 2012
- 296
-
A Hash Chains Based Key Management Scheme for Wireless Sensor NetworksZhao, H. / Qin, J. / Shu, M. / Hu, J. et al. | 2012
- 309
-
An Event-Based Packet Dropping Detection Scheme for Wireless Mesh NetworksMorais, A. / Cavalli, A. et al. | 2012
- 324
-
A State-Aware RFID Privacy Model with Reader CorruptionLee, K. / Nieto, J.G. / Boyd, C. et al. | 2012
- 339
-
An Improved Anti-collision Algorithm for ISO15693 RFID SystemsShi, L. / Wang, X. / Fu, W. / Liu, X. / Qin, Z. et al. | 2012
- 352
-
Near-Optimal Collusion-Secure Fingerprinting Codes for Efficiently Tracing Illegal Re-distributionWu, X.-W. / Liew, A.W.-C. et al. | 2012
- 362
-
A Forward-Secure Certificate-Based Signature Scheme in the Standard ModelLi, J. / Zhang, Y. / Teng, H. et al. | 2012
- 377
-
Policy-Based Vulnerability Assessment for Virtual OrganisationsMuhammad, J. / Doherty, T. / Hussain, S. / Sinnott, R. et al. | 2012
- 400
-
Constant-Ciphertext-Size Dual Policy Attribute Based EncryptionMiyaji, A. / Tran, P.V.X. et al. | 2012
- 414
-
Sophisticated Phishers Make More Spelling Mistakes: Using URL Similarity against PhishingMaurer, M.-E. / Hofer, L. et al. | 2012
- 427
-
Secure Mobility Management Based on Session Key AgreementsJung, Y. / Festijo, E. et al. | 2012
- 441
-
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud ComputingPatel, A. / Taghavi, M. / Bakhtiyari, K. / Junior, J.C. et al. | 2012
- 459
-
Portability Evaluation of Cryptographic Libraries on Android SmartphonesBraga, A.M. / Nascimento, E.N. et al. | 2012
- 470
-
Secure Middleware PatternsFernandez, E.B. / Uzunov, A.V. et al. | 2012
- 483
-
Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm ReductionMeng, Y. / Kwok, L.-f. et al. | 2012
- 498
-
Towards Effective Algorithms for Intelligent Defense SystemsJohnstone, M.N. / Woodward, A. et al. | 2012