21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliography 229<br />

[64] L. Eschenauer and V. D. Gligor. A Key-Management Scheme <strong>for</strong> Distributed<br />

<strong>Sensor</strong> <strong>Networks</strong>. In Proceed<strong>in</strong>gs of the 9th ACM Conference<br />

on Computer and <strong>Communication</strong>s Security (CCS). ACM Press, 2002.<br />

[65] Deborah Estr<strong>in</strong>, Ramesh Gov<strong>in</strong>dan, John Heidemann, and Satish Kumar.<br />

Next Century Challenges: Scalable Coord<strong>in</strong>ation <strong>in</strong> <strong>Sensor</strong> <strong>Networks</strong>. In<br />

Proceed<strong>in</strong>gs of the 5th Annual ACM/IEEE International Conference on<br />

Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g, pages 263–270. ACM Press, 1999.<br />

[66] L. Fernando Friedrich, John Stankovic, Marty Humphrey, Michael Marley,<br />

and John Hask<strong>in</strong>s. A Survey of Configurable, Component-Based<br />

Operat<strong>in</strong>g Systems <strong>for</strong> Embedded Applications. IEEE Micro, 21(3):54–<br />

68, 2001.<br />

[67] Bundesamt für Sicherheit <strong>in</strong> der In<strong>for</strong>mationstechnik (BSI). Digitale<br />

Sicherheitsmerkmale im elektronischen Reisepass. http://www.bsi.<br />

de/fachthem/epass/Sicherheitsmerkmale.pdf, June 2005.<br />

[68] D. Ganesan, R. Gov<strong>in</strong>dan, S. Shenker, and D. Estr<strong>in</strong>. Highly-Resilient,<br />

Energy-Efficient Multipath Rout<strong>in</strong>g <strong>in</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong>. Mobile<br />

Comput<strong>in</strong>g and <strong>Communication</strong>s Review, 1(2), 1997.<br />

[69] Simson Garf<strong>in</strong>kel. PGP Pretty Good Privacy. O’Reilly, 1994.<br />

[70] Brian Gladman. AES and Comb<strong>in</strong>ed Encryption/Authentication Modes.<br />

http://fp.gladman.plus.com/AES/, 2005.<br />

[71] Michael T. Goodrich. Efficient and secure network rout<strong>in</strong>g algorithms.<br />

http://www.cs.jhu.edu/~goodrich/cgc/pubs/rout<strong>in</strong>g.<br />

pdf, 2001.<br />

[72] Michael T. Goodrich. Leap-Frog Packet L<strong>in</strong>k<strong>in</strong>g and Diverse Key Distributions<br />

<strong>for</strong> Improved Integrity <strong>in</strong> Network Broadcasts. In 2005 IEEE<br />

Symposium on Security and Privacy, pages 196–207. IEEE, 2005.<br />

[73] IETF Work<strong>in</strong>g Group. Doma<strong>in</strong> Keys Identified Mail (DKIM). http://<br />

www.ietf.org/html.charters/dkim-charter.html, January 2006.<br />

[74] Nils Gura, Arun Patel, Arv<strong>in</strong>derpal Wander, Hans Eberle, and Sheuel<strong>in</strong>g<br />

Chang Shantz. Compar<strong>in</strong>g Elliptic Curve Cryptography and RSA on<br />

8-bit CPUs. In Cryptographic Hardware and Embedded Systems - CHES<br />

2004: 6th International Workshop, volume 3156 of LNCS. Spr<strong>in</strong>ger-<br />

Verlag, 2004.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!