A key-distribution mechanism for wireless sensor networks using Zig-Zag product
暂无分享,去创建一个
Ahmad Khonsari | Mohamed Ould-Khaoua | Hosein Shafiei | Mohammad Sadegh Talebi | M. Ould-Khaoua | M. S. Talebi | A. Khonsari | Hosein Shafiei
[1] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[2] Mohsen Guizani,et al. An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.
[3] Ahmad Khonsari,et al. A Combinatorial Approach for Key-Distribution in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[4] Douglas R. Stinson,et al. Key predistribution for homogeneous wireless sensor networks with group deployment of nodes , 2010, TOSN.
[5] Noga Alon,et al. Semi-direct product in groups and zig-zag product in graphs: connections and applications , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[6] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[7] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[10] Hossam S. Hassanein,et al. Connectivity Optimization for Wireless Sensor Networks Applied to Forest Monitoring , 2009, 2009 IEEE International Conference on Communications.
[11] R. Srikant,et al. Unreliable sensor grids: coverage, connectivity and diameter , 2005, Ad Hoc Networks.
[12] Azzedine Boukerche,et al. ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks , 2010, CMC 2010.
[13] N. Linial,et al. Expander Graphs and their Applications , 2006 .
[14] Moti Yung,et al. Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[15] Amnon Ta-Shma,et al. A Combinatorial Construction of Almost-Ramanujan Graphs Using the Zig-Zag Product , 2011, SIAM J. Comput..
[16] Sushmita Ruj,et al. Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks , 2009, TOSN.
[17] Panganamala Ramana Kumar,et al. Scaling Laws for Ad Hoc Wireless Networks: An Information Theoretic Approach , 2006, Found. Trends Netw..
[18] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[19] Xueping Li,et al. Key establishment for layered group-based Wireless Sensor Networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..
[20] M. Murty. Ramanujan Graphs , 1965 .
[21] Nidal Nasser,et al. Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks , 2008, Secur. Commun. Networks.
[22] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[23] A. Wigderson,et al. ENTROPY WAVES, THE ZIG-ZAG GRAPH PRODUCT, AND NEW CONSTANT-DEGREE , 2004, math/0406038.
[24] Béla Bollobás,et al. The Diameter of a Cycle Plus a Random Matching , 1988, SIAM J. Discret. Math..