SPINS: Security protocols for sensor networks
From MaRDI portal
Recommendations
Cited in
(41)- A chaos-based secure cluster protocol for wireless sensor networks
- Formal models and analysis of secure multicast in wired and wireless networks
- Quantum Wireless Sensor Networks
- Rijndael for sensor networks: is speed the main issue?
- Accelerating signature-based broadcast authentication for wireless sensor networks
- A new protocol for the detection of node replication attacks in mobile wireless sensor networks
- Secure sensor networks for perimeter protection.
- SecLEACH-on the security of clustered sensor networks
- scientific article; zbMATH DE number 1978148 (Why is no real title available?)
- Code updates based on minimal backbone and group key management for secure sensor networks
- Towards secure and practical MACs for body sensor networks
- Efficient and reliable post-quantum authentication
- Step-size sequence design for finite-time average consensus in secure wireless sensor networks
- Chaos block cipher for wireless sensor network
- Distance-Avoiding Sequences for Extremely Low-Bandwidth Authentication
- BAP: Broadcast Authentication Using Cryptographic Puzzles
- Sec-TMP: A secure topology maintenance protocol for event delivery enforcement in WSN
- Search on security in sensor networks
- A survey on position-based routing algorithms in wireless sensor networks
- SPINS
- Secure collection tree protocol for tamper-resistant wireless sensors
- Linear approaches to resilient aggregation in sensor networks
- Quantum security in wireless sensor networks
- On optimal cryptographic key derivation
- Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
- Security and trust in sensor networks
- ECM-IBS: a Chebyshev map-based broadcast authentication for wireless sensor networks
- Negotiation-based protocols for disseminating information in wireless sensor networks
- Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks
- Principles of Distributed Systems
- A power efficient aggregation of encrypted data in wireless sensor network
- Combinatorial design of key distribution mechanisms for wireless sensor networks
- Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks
- Dealing with liars: misbehavior identification via Rényi-Ulam games
- A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
- A distributed data storage scheme for sensor networks
- CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks
- HORSIC: an efficient one-time signature scheme for wireless sensor networks
- An efficient key management protocol for wireless sensor networks
- A clean slate approach to secure wireless networking
- Modeling and verifying ad hoc routing protocols
This page was built for publication: SPINS: Security protocols for sensor networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1859201)