1 |
E. Shi, and A. Perrig,'Designing secure sensor networks', IEEE Wireless Communication, pp.8-43, 2004
|
2 |
C. Krauß, F. Stumpf, and C. Eckert,'Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques', ESAS 2007, LNCS 4572, pp.203-217, 2007
|
3 |
Group, T.C.: Trusted Platform Module (TPM) specifications, Technical report (2006) https://www.trustedcomputinggroup.org/specs/TPM
|
4 |
Y. Yang, X. Wang, S. Zhu, and G. Cao,'Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks', SRDS 2007, pp.219-230, 2007
|
5 |
A. Seshadri, A. Perrig, L. V. Doorn, and P. K. Khosla,'SWATT: SoftWare-based ATTestation for Embedded Devices', IEEE Symposium on Security and Privacy, pp.272-282, 2004
|
6 |
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. V. Doorn, and P. K. Pioneer,'Verifying integrity and guaranteeing execution of code on legacy platforms', SOSP, pp.1-15, 2005
|
7 |
M. Mitzenmacher, and E. Upfal,'Probability and Computing: Randomized Algorithms and Probabilistic Analysis', Cambridge University Press, 2005
|
8 |
S. Zhu, S. Setia, and S. Jajodia,'LEAP: efficient security mechanisms for large-scale distributed sensor networks', CCS '03, pp 62-72, 2003
|
9 |
J. Deng, R. Han, and S. Mishra,'A practical study of transitory master key establishment for wireless sensor networks', SecureComm 2005, pp.289-299, 2005
|
10 |
Microsoft, NGSCB(Next-Generation Secure Computing Base), http://www.microsoft.com/resources/ngscb/default.mspx
|