1 |
A. Perrig, J. Stankovic, and D. Wagner, 'Security in Wireless Sensor Networks,' CACM, Vol. 47, No. 6, June 2004
|
2 |
A. Perrig, R. Canetti, D.Song and J.F.Tygar, 'Efficient and secure source authentication for multicast,' Network and Distributed System Security Symposium, NDSS' 01, 2001
|
3 |
A. Perrig, R. Canetti, J.F.Tygar and D.Song, 'Efficient Authentication and Signing of multicast streams over lossy channels,' IEEE Symposium on Security and Privacy, 2000
|
4 |
O. Goldreich, S, Goldwasser and S. Micali, 'How to construct random functions,' Journal of the ACM 33(4), 792-807, 1986
DOI
ScienceOn
|
5 |
Y.C. Hu, A. Perrig, D.B. Johnson, 'Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols', In Proc. of 2nd ACM Workshop on Wireless Security(WiSe' 03), 2003
|
6 |
ADRIAN PERRIG, ROBERT SZEWCZYK, J.D. TYGAR, VICTOR WEN and DAVID E. CULLER, 'SPINS: Security Protocols for Sensor Networks,' Wireless Networks 8, 521-534, 2002
DOI
ScienceOn
|
7 |
J. Deng, R. Han, S. Mishra, 'Security Support In-Network Processing in Wireless Sensor Networks' , In Proc. of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003
|