21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bibliography 225<br />

1st European Workshop on <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong>, volume 2920 of<br />

LNCS. Spr<strong>in</strong>ger-Verlag, 2004.<br />

[21] Matt Bishop. Computer Security – Art and Science. Addison-Wesley,<br />

2002.<br />

[22] Erik-Oliver Blaß and Mart<strong>in</strong>a Zitterbart. Towards Acceptable Public-<br />

Key Encryption <strong>in</strong> <strong>Sensor</strong> <strong>Networks</strong>. In 2nd International Workshop on<br />

Ubiquitous Comput<strong>in</strong>g, pages 88–93. INSTICC Press, 2005.<br />

[23] Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized Trust Management.<br />

In IEEE Symposium on Security and Privacy. IEEE, 1996.<br />

[24] Rolf Blom. An Optimal Class of Symmetric Key Generation Systems. In<br />

Advances <strong>in</strong> Cryptology: Proceed<strong>in</strong>gs of EUROCRYPT 84 - A Workshop<br />

on the Theory and Application of Cryptographic Techniques, volume 209<br />

of LNCS. Spr<strong>in</strong>ger-Verlag, 1985.<br />

[25] Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo<br />

Vaccaro, and Moti Yung. Perfectly-<strong>Secure</strong> Key Distribution <strong>for</strong> Dynamic<br />

Conferences. In Advances <strong>in</strong> Cryptology - CRYPTO ’92: 12th Annual<br />

International Cryptology Conference, volume 740 of LNCS. Spr<strong>in</strong>ger-<br />

Verlag, 1993.<br />

[26] Jürgen Bohn, Vlad Coroama, Marc Langhe<strong>in</strong>rich, Friedemann Mattern,<br />

and Michael Rohs. Social, Economic, and Ethical Implications of Ambient<br />

Intelligence and Ubiquitous Comput<strong>in</strong>g. In W. Weber, J. Rabaey,<br />

and E. Aarts, editors, Ambient Intelligence, pages 5–29. Spr<strong>in</strong>ger-Verlag,<br />

2005.<br />

[27] Béla Bollobás. Random Graphs. Cambridge University Press, 2001.<br />

[28] Mike Bond and Ross Anderson. API-Level Attacks on Embedded Systems.<br />

Computer, 34(10), 2001.<br />

[29] Detlef Borchers. Nun doch e<strong>in</strong> Vorzeigeprojekt. c’t, 2, 2005.<br />

[30] Nikita Borisov, Ian Goldberg, and David Wagner. Intercept<strong>in</strong>g Mobile<br />

<strong>Communication</strong>s: The Insecurity of 802.11. In Proceed<strong>in</strong>gs of the 7th<br />

Annual International Conference on Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g.<br />

ACM Press, 2001.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!