72
第39卷
西安电子科技大学学报(自然科学fit)
Academy of
Sciences,2010,25(4):41l一419.
[3]
顾晶晶,陈松灿,庄毅.基于无线传感器网络拓扑结构的物联网定位模型叨.计算机学报.2010。33(9):1548—1556.
Gu
Yi.Wireless
Structures for the Internet of
Topology Things
Jingjing,Chen Songcan.Zhuang
Sensor Network—Based
of
Localization[J].Chinese Journal
Computers,2010,33(9):1548—1556.
B.A
[4]
[5]
of
Issues in Wireless Sensor
Networks[J].IEEE
In
of
Wang Yong,Attebury G,Ramamurthy
Survey
Security
Communications
Surveys&Tutorials,2006,8(2):2-23.
裴庆琪,沈玉龙.马建峰.无线传感器网络安全技术综述D].通信学报,2007,28(8):113—122.
Wireless
Pei
Yulong,Ma
of
Sensor Network Security
Techniques[J1.Journal
Qingqi,Shen
Jianfeng.Survey
Communication,2007,28(8):113—122.
[6]
刘云,裴庆琪.一种传感器网络访问控制机制[J].西安电子科技大学学报,2010,37(3):507—512.
Control Scheme in Wireless Sensor Network
Liu
of Xidian
University,2010,37
Yun,Pei
Qingqi.Access
D].Journal
(3):507—512.
Authenticated
in Wireless Sensor
Networks[C]//Proc
of
[7]Banerjee S,MukhopadhyayD.Symmetric KeyBased
Querying
the First International Conference on
Internet Ad Hoe and Sensor Networks.New York:ACMPress.2006.
Access Control for Wireless Sensor Networks
Integrated
MA,et
[8] Maccari L,Mainardi L。Marchitt
a1.Lightweight,Distributed
Conference on Communications
Supporting Mobility[C]//International
1445.
2008(ICC’08).Beijing:IEEE,2008:1441一
Benenson
F
D.An
in
[9]
Z,Gartner
Framework for Robust Access Control
Wireless Sensor
C,Kesdogan
Algorithmic
0
n
Wireless Sensor
Networks(EWSN).Germary:Computer Science,
Networks[C]//Second European Workshop
2005:158—165.
Robust
g,Gedicke N,Raivio
User Authentication in Sensor
on Real—
[10]Benenson
O.Realizing
Networks[(:]//Workshop
World Wireless Sensor Networks.Stockholm:Swedish Insitute of
Science。2005:135—142.
Computer
S
[11]Watro R,Kong D,Cuti fen,et
Sensor Networks with Public
Networks.Washington:ACM
of
the
Key
a1.TinyPK:Securing
Technology[C]//Proc
2nd ACM workshop on
of Ad Hocand Sensor
Press,2004:59—64.
Security
P.Access
and Practice
Communications
Magazine,1994,32(9):40—
[12]Sandhu R,Samarati
Control:Principles
D].IEEE
48.
E
H
a1.Role—Based Access Control
L。et
[13]Sandhu
J,Feinstein
R.Coyne
Models[J].IEEE Computers,1996,29(2):
38—47.
D.An Attribute—Based Access Matrix
of the 2005 ACMSymposium on
Applied
[14]Zhang X,Li Y,Nalla
Model[cJ//Proc
Mexico:ACM Press.2005:359—363.
Computing.New
L
F15]Wang Y,Wijesekera D,Jajodia
S.A
Framework for Attribute Based Access
of the
Logic—Based
Control[c]//Proc
2004 ACMWorkshop on Formal Methods in
Based
Security
Press。2004:45—55.
Engineering.Washington:ACM
of
E16]Sahai A。Waters
B.Fuzzy Identity
Encryption[c]//Proc
Eurocrypt 2005.Berlin:Springer-Verlag,2005:457—
473.
from the Weil
of the 21st Annual International
Pairing[c]//Proc
[17]Boneh D,Franklin M.Identity—Based Encryption
Advances in
Conference on
Cryptology
Cryptology.Berlin:Springer-Verlag。2001:213—229.
(编辑:高西全)
http:|}ⅥwⅢ.xdxb.net
万方数据
全部评论(0)