设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
CNKI学位论文(1)
在“
SpringerLink电子期刊
”中,
命中:
7
条,耗时:0.0279921 秒
在所有数据库中总计命中:
1
条
1.
Resilient Secure Localization and Detection of
Colluding
Attack
ers in WSNs
作者:
Wei Shi (1) wei.shi@uoit.ca
Meng Yao (2) mengyao86@gmail.com
Jean-Pierre Corriveau (2) jeanpier@scs.carleton.ca
关键词:
Secure Localization
8211
;
Colluding
Attack
er Detection
8211
;
Wireless Sensor Networks
刊名:Lecture Notes in Computer Science
出版年:2012
2.
An
Attack
on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
作者:
Jaydip Sen (1) jaydip.sen@acm.org
Subhamoy Maitra (2) subho@isical.ac.in
关键词:
Wireless sensor network
8211
;
privacy
8211
;
data aggregation
8211
;
cluster
;
based private data aggregation (CPDA)
8211
;
key distribution
8211
;
colluding
attack
8211
;
malicious node
刊名:Lecture Notes in Computer Science
出版年:2012
3.
Secure routing in MANETs using local times
作者:
Stephen Dabideen (1) dabideen@bbn.com
J. J. Garcia-Luna-Aceves (12) jj@soe.ucsc.edu
关键词:
Ad
;
hoc networks
8211
;
Security
8211
;
Routing
8211
;
Time
;
based ordering
刊名:Wireless Networks
出版年:2012
4.
An Anti-collusion Trust Model in P2P Networks
作者:
Xin Tang (1) sssntte@126.com
Ruchuan Wang (123) wangrc@njupt.edu.cn
Haiping Huang (123) hhp@njupt.edu.cn
关键词:
P2P Networks
8211
;
Collusion
Attack
8211
;
Trust Model
8211
;
Penalty Factor
8211
;
Convergence
刊名:Lecture Notes in Computer Science
出版年:2011
5.
Unforgeability of Re-Encryption Keys against Collusion
Attack
in Proxy Re-Encryption
作者:
Ryotaro Hayashi (1) ryotaro.hayashi@toshiba.co.jp
Tatsuyuki Matsushita (1) tatsuyuki.matsushita@toshiba.co.jp
Takuya Yoshida (2) Yoshida.Takuya@toshiba-sol.co.jp
Yoshihiro Fujii (2) Fujii.Yoshihiro@toshiba-sol.co.jp
Koji Okada (2) Okada.Koji@toshiba-sol.co.jp
关键词:
Proxy re
;
encryption
8211
;
non
;
transferability
8211
;
unforgeability of re
;
encryption keys
刊名:Lecture Notes in Computer Science
出版年:2011
6.
Securing Internet Coordinate Systems
作者:
Dali Kaafar
;
Laurent Mathy
;
Kav¨¦ Salamatian
;
Chadi Barakat
;
Thierry Turletti
;
et al.
刊名:Lecture Notes in Computer Science
出版年:2007
7.
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks
8211
; A Friend Approach
作者:
Shukor Abd Razak
;
Steven Furnell
;
Nathan Clarke
;
Phillip Brooke
刊名:Lecture Notes in Computer Science
出版年:2006
1
按检索点细分(7)
关键词(2)
文摘(1)
按出版年细分(7)
2012年(3)
2011年(2)
2007年(1)
2006年(1)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.