Author:
Seshadri Arvind,Luk Mark,Perrig Adrian
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)
2. Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of Conference on Computer and Communication Security, November 2002, pp. 41–47 (2002)
3. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (May 2003)
4. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 52–61 (2003)
5. Du, W., Deng, J., Han, Y., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 42–51 (2003)
Cited by
52 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
2. AI-Powered Security for IoT: A Blockchain Enabled Device Twin Approach;Online Identity - An Essential Guide [Working Title];2023-12-08
3. Context-Aware Adaptive Anomaly Detection in IoT Systems;Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing;2023-10-07
4. CASU;Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design;2022-10-30
5. Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces;IEEE Internet of Things Journal;2022-10-15