Efficient Handling of Adversary Attacks in Aggregation Applications
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Efficient and optimally secure in-network aggregation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
Security and Communication Networks
On the optimal allocation of adversarial resources
Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
Hi-index | 0.00 |
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash ...