21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

232 Bibliography<br />

[95] Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan, and Srivaths<br />

Ravi. Security as a New Dimension <strong>in</strong> Embedded Systems Design.<br />

In 41st Conference on Design Automation, pages 753–760. IEEE, 2004.<br />

[96] Oliver Kömmerl<strong>in</strong>g and Markus G. Kuhn. Design Pr<strong>in</strong>ciples <strong>for</strong> Tamper-<br />

Resistant Smartcard Processors. In USENIX Workshop on Smartcard<br />

Technology (Smartcard ’99), pages 9–20. USENIX Association, 1999.<br />

[97] Philip Koopman. Embedded System Security. Computer, July 2004.<br />

[98] A. Kröller, D. Pfisterer, C. Buschmann, S. P. Fekete, and S. Fischer.<br />

Shawn: A new approach to simulat<strong>in</strong>g wireless sensor networks. http:<br />

//arxiv.org/abs/cs.DC/0502003, February 2005.<br />

[99] D. Richard Kuhn, Thomas J. Walsh, and Steffen Fries. Security Considerations<br />

<strong>for</strong> Voice over IP Systems – Recommendations of the National<br />

Institute of Standards and Technology. http://csrc.nist.<br />

gov/publications/nistpubs/800-58/SP800-58-f<strong>in</strong>al.pdf, January<br />

2005. NIST Special Publication 800-58.<br />

[100] Fabian Kuhn, Roger Wattenhofer, Yan Zhang, and Aaron Zoll<strong>in</strong>ger. Geometric<br />

Ad-Hoc Rout<strong>in</strong>g: Of Theory and Practice. In 22nd ACM Symposium<br />

on the Pr<strong>in</strong>ciples of Distributed Comput<strong>in</strong>g (PODC), pages 63–72.<br />

ACM Press, 2003.<br />

[101] Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, and Manfred<br />

Schimmler. Break<strong>in</strong>g Ciphers with COPACOBANA – A Cost-Optimized<br />

Parallel Code Breaker. In Cryptographic Hardware and Embedded Systems<br />

- CHES 2006, volume 4249 of LNCS, pages 101–118. Spr<strong>in</strong>ger-<br />

Verlag, 2006.<br />

[102] Kaspersky Lab. PDAs under attack. http://www.kaspersky.<br />

com/news?id=151142122, August 2004. Appearance of the Backdoor.W<strong>in</strong>CE.Brador.a<br />

Trojan horse program.<br />

[103] RSA Laboratories. PKCS #5 v2.0: Passoword-Based Cryptography<br />

Standard. ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/<br />

pkcs5v2-0.pdf, March 1999.<br />

[104] RSA Laboratories. PKCS #1 v2.1: RSA Cryptography Standard. ftp:<br />

//ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf,<br />

June 2002.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!