1 |
W. Jansen, and T. Grance(2011), "Guidelines on Security and Privacy in Public Cloud Computing".
|
2 |
M. Mannan, B. H. Kim, A. Ganjali, and D. Lie(2011), "Unicorn: Two-factor Attestation for data Security", Proc. of the 18th ACM conference on Computer and Communications Security.
|
3 |
F. Zhang, J. Chen, H. Chen, and B. Zang(2011), "CloudVisor: Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization", Proc. of 23rd ACM Symposium on Operating Systems Principles.
|
4 |
L. Eschenauer and V. D. Gligor(2002), "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, pp. 41-47.
|
5 |
Gupta G, Younis M(2003), "Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks" In the proc. of 10th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia.
|
6 |
M. Tatebayashi, N. Matsuzaki, and D. B. Newman(1999), "Key distribution protocol for digital mobile communication systems," Advances in Cryptology-CRYPTO'89, pp. 324-334, INCS Volume 435, Springer-verlag.
|
7 |
C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii(1993), "On key distrubution and authentication in mobile radio networks," Advances in Cryptology - euroCrypt'93, pp. 461-465, INCS Volume 765, Springer-verlag.
|
8 |
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti(2001). "Secure pebblenets," In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, ACM Press, pp. 156-163.
|
9 |
A. Khalili, et al.(2003), "Toward Secure key Distribution in Truly Ad-Hoc Networks," IEEE SAINT'03, pp. 342-346.
|
10 |
L. Echenauer and V. D. Gligor(2002), "A Key-Management scheme for Distributed sensor networks," In Proceedings of the 9th Computer Communication Security, pp.41-47.
|
11 |
H. Chan, A. Perrig, and D. Song(2003), "Random key predistribution schemes for Sensor networks," In IEEE Symposium on Research in Security and Privacy, pp.197-213
|
12 |
S. Zhu, S. Setia, and S. Jajodia(2002), "A distributed group key managemet protocol for ad hoc networks," Unpublished manuscript, George Mason University.
|
13 |
D. W. Kim, J. W. Han, and K. I. Chung(2009), "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11.
|
14 |
S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han(2009), "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131.
|
15 |
D. Halperin, T. S. Heydt-Benjamin, B. Ransford et al.(2009), "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses", in Proc. of SP'08, pp. 129-142.
|