Author:
Dini Gianluca,Lopriore Lanfranco
Subject
Hardware and Architecture,Software
Reference39 articles.
1. A password-capability system;Anderson;Comput. J.,1986
2. A survey of intrusion detection systems in wireless sensor networks;Butun;IEEE Commun. Surv. Tutorials,2014
3. H. Cha et al., RETOS: resilient, expandable, and threaded operating system for wireless sensor networks, in: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, Cambridge, Massachusetts, USA, April 2007, pp. 148–157.
4. H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2003, pp. 197–213.
5. J. S. Chase, H. M. Levy, E. D. Lazowska, M. Raker-Harvey, “Lightweight shared objects in a 64-bit operating system”, in: Proceeding of the Conference on Object-Oriented Programming Systems, Languages, and Applications, Vancoover, October 1992; in: SIGPLAN Notices, vol. 27, no. 10 1992, pp. 397–413.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Two-dimensional diagonal layer hash chain based key pre-distribution scheme;Journal of Information Security and Applications;2021-12
2. Protected pointers to specify access privileges in distributed systems;Journal of Parallel and Distributed Computing;2019-04
3. Key management in wireless sensor networks;Information Security Journal: A Global Perspective;2019-03-04
4. Representation and management of multiple keys;Computers & Electrical Engineering;2018-11
5. Key management in tree shaped hierarchies;Information Security Journal: A Global Perspective;2018-07-04