无线传感器网络在知识获取过程中的若干安全问题研究

60970138
2009
F0205.网络与系统安全
朱文涛
面上项目
研究员
中国科学院信息工程研究所
29万元
安全数据融合;安全定位;传感器网络;知识获取;密钥管理
2010-01-01到2012-12-31
  • 中英文摘要
  • 结题摘要
  • 结题报告
  • 项目成果
  • 项目参与人
查看更多信息请先登录或注册
查看更多信息请先登录或注册
查看更多信息请先登录或注册
重置
序号 标题 类型 作者
1 An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks 期刊论文 Xu, Jing|Zhu, Wen-Tao|Feng, Deng-Guo|
2 An efficient location-based compromise-tolerant key management scheme for sensor networks 期刊论文 Duan, Mei-Jiao|Xu, Jing|
3 Detecting node replication attacks in wireless sensor networks: A survey 期刊论文 Zhu, Wen Tao|Zhou, Jianying|Deng, Robert H.|Bao, Feng|
4 Mitigating DoS attacks against signature-based authentication in VANETs 会议论文 He, Li|Zhu, Wen Tao|
5 Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation 会议论文 Yang, Wenbo|Zhu, Wen Tao|
6 Secure mobile subscription of sensor-encrypted data 会议论文 Chu, Cheng-Kang|Zhu, Wen Tao|Chow, Sherman|Zhou, Jianying|Deng, Robert|
7 A comment on `MABS: Multicast authentication based on batch signature' 期刊论文 Zhu, Wen Tao|
8 F5P5: Keyword search over encrypted data with five functions and five privacy assurances 会议论文 Shuai, Huimin|Zhu, Wen Tao|
9 Applying time-bound hierarchical key assignment in wireless sensor networks 会议论文 Zhu, Wen Tao|Deng, Robert|Zhou, Jianying|Bao, Feng|
10 Voting-on-Grid Clustering for Secure Localization in Wireless Sensor Networks 会议论文 Yang, Wenbo|Zhu, Wen Tao|
11 A secure and efficient data aggregation scheme for wireless sensor networks 期刊论文 Zhu, Wen Tao|Gao, Fei|Xiang, Yang|
12 Analysis of a replication attack detection protocol for wireless sensor networks 会议论文 Zhu, Wen Tao|
13 Protecting user anonymity in location-based services with fragmented cloaking region 会议论文 Li, Tai Cheng|Zhu, Wen Tao|
14 Towards secure and communication-efficient broadcast encryption systems 期刊论文 Zhu, Wen Tao|
15 Detecting node replication attacks in mobile sensor networks: theory and approaches 期刊论文 Zhu, Wen Tao|Zhou, Jianying|Deng, Robert H.|Bao, Feng|
16 Node replication attacks in wireless sensor networks: Bypassing the neighbor-based detection scheme 会议论文 Zhu, Wen Tao|
17 Secure localization with attack detection in wireless sensor networks 期刊论文 Zhu, Wen Tao|Xiang, Yang|Zhou, Jianying|Deng, Robert H.|Bao, Feng|
18 A smart card based generic construction for anonymous authentication in mobile networks 会议论文 Xu, Jing|Zhu, Wen-Tao|Feng, Deng-Guo|
19 A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card 期刊论文 Xu, Jing|Zhu, Wen-Tao|Jin, Wen-Ting|
20 Time-Bound Hierarchical Key Assignment: An Overview 期刊论文 Zhu, Wen Tao|Deng, Robert H.|Zhou, Jianying|Bao, Feng|
21 Masque: Access control for interactive sharing of encrypted data in social networks 会议论文 Shuai, Huimin|Zhu, Wen Tao|
查看更多信息请先登录或注册