1. Trang chủ
  2. » Luận Văn - Báo Cáo

Xây dựng hệ cơ sở dữ liệu tinysol cho mạng cảm biến không dây có bảo mật kênh truyền

93 47 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 93
Dung lượng 2,25 MB

Nội dung

Ngày đăng: 26/01/2021, 14:00

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[1] N.Tsiftes, Adam Dunkels, “A Database in Every Sensor”, in Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, ACM New York, NY, USA 2011, pp 316-332 Sách, tạp chí
Tiêu đề: A Database in Every Sensor
[2] W.Stallings, “CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, 5 th edition”, Pearson Education Inc, 2011 Sách, tạp chí
Tiêu đề: CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE, 5th edition
[3] Socrates Varakliotis, et al., “Universal Integration of the Internet of Things through an IPv6-based Service Oriented Architecture enabling heterogeneous components interoperability”, October 2011 to Septemper 2014 Sách, tạp chí
Tiêu đề: Universal Integration of the Internet of Things through an IPv6-based Service Oriented Architecture enabling heterogeneous components interoperability
[4] Erwin, “Encryption and Key Exchange in Wireless Sensor Networks”, January 2013 Sách, tạp chí
Tiêu đề: Encryption and Key Exchange in Wireless Sensor Networks
[5] Seyit A. Camtepe, Bulent Yener, “Key Distribution Mechanisms for Wireless Sensor Networks: a Survey”, Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, Troy, NY 12180-3590, March 2005 Sách, tạp chí
Tiêu đề: Key Distribution Mechanisms for Wireless Sensor Networks: a Survey
[6] N.Gura, et al., “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs”, in 6th International Workshop Cambridge, MA, USA, August 2004 Sách, tạp chí
Tiêu đề: et al.", “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs
[8] G.S.Quirino, et al., “Performance Evaluation of Asymmetric Encryption Algorithms in embedded platforms used in WSNs”, in Proceedings of the International Conference on Security and Management (SAM), Athens, 2013 Sách, tạp chí
Tiêu đề: et al.", “Performance Evaluation of Asymmetric Encryption Algorithms in embedded platforms used in WSNs
[9] G.D.S.Quirino, E.D.Moreno, “ARCHITECTURAL EVALUATION OF ALGORITHMS RSA, ECC AND MQQ IN ARM PROCESSORS”, in International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013 Sách, tạp chí
Tiêu đề: ARCHITECTURAL EVALUATION OF ALGORITHMS RSA, ECC AND MQQ IN ARM PROCESSORS
[10] T. Yan, et al., “Studies on security communications of embedded devices”, in Advanced Materials Research, vol. 216, 2011, pp. 609–612 Sách, tạp chí
Tiêu đề: et al.", “Studies on security communications of embedded devices
[11] Hyubgun Lee, et al, “AES Implementation and Performance Evaluation on 8- bit Microcontrollers”, in (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, 2009 Sách, tạp chí
Tiêu đề: et al", “AES Implementation and Performance Evaluation on 8-bit Microcontrollers
[12] Abidalrahman Moh’d, et al., “A Secure Platform of Wireless Sensor Networks”, in the 2nd International Conference on Ambient Systems, Networks and Technologies, 2011 Sách, tạp chí
Tiêu đề: et al.", “A Secure Platform of Wireless Sensor Networks
[13] Shahnaz Saleem, et al., “On the Security Issues in Wireless Body Area Networks”, in Journal of Digital Content Technology and its Applications (JDCTA), 2009 Sách, tạp chí
Tiêu đề: et al.", “On the Security Issues in Wireless Body Area Networks
[14] P.D.Khambre, et al., “Secure Data in Wireless Sensor Network via AES”, in International Journal of Computer Science and Information Technologies, Vol.3, 2012, pp 3588-3592 Sách, tạp chí
Tiêu đề: et al.", “Secure Data in Wireless Sensor Network via AES
[15] Kuldeep Bhardwaj, Sanjay Chaudhary, “Implementation of Elliptic Curve Cryptography in C”, in International Journal on Emerging Technologies 3, 2012, pp 38-51 Sách, tạp chí
Tiêu đề: Implementation of Elliptic Curve Cryptography in C
[16] Bjửrn Fay, “Double-and-Add with Relative Jacobian Coordinates”, IACR Cryptology ePrint Archive, December 2014 Sách, tạp chí
Tiêu đề: Double-and-Add with Relative Jacobian Coordinates
[17] Haodong Wang, et al., “Elliptic curve cryptography-based access control in sensor networks”, International Journal of Security and Networks, Vol. 1, 2006 Sách, tạp chí
Tiêu đề: et al.", “Elliptic curve cryptography-based access control in sensor networks
[18] Dhanashri H. Gawali1, Vijay M. Wadhai, “RC5 ALGORITHM: POTENTIAL CIPHER SOLUTION FOR SECURITY IN WIRELESS BODY SENSOR NETWORKS (WBSN)”, International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 2, No.3, July 2012 Sách, tạp chí
Tiêu đề: RC5 ALGORITHM: POTENTIAL CIPHER SOLUTION FOR SECURITY IN WIRELESS BODY SENSOR NETWORKS (WBSN)
[19] Bharat Singh, et al., “Sensor Data Encryption Protocol for Wireless Network Security”, Global Journal of Computer Science and Technology, Vol 12, April 2012 Sách, tạp chí
Tiêu đề: et al.", “Sensor Data Encryption Protocol for Wireless Network Security
[20] Certicom Research, “SEC 2: Recommended Elliptic Curve Domain Parameters”, January 2010 Sách, tạp chí
Tiêu đề: SEC 2: Recommended Elliptic Curve Domain Parameters
[21] David Brumley, Dan Boneh, “Remote Timing Attacks are Practical”, in proceedings of the 12th Usenix Security Symposium, 2003 Sách, tạp chí
Tiêu đề: Remote Timing Attacks are Practical

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w