Key-management scheme for wireless sensor networks based on merging blocks of symmetric design
暂无分享,去创建一个
[1] Han-Chieh Chao,et al. A survey of key distribution in wireless sensor networks , 2014, Secur. Commun. Networks.
[2] Roberto Di Pietro,et al. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs , 2009, EURASIP J. Wirel. Commun. Netw..
[3] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[4] C. Colbourn,et al. Handbook of Combinatorial Designs , 2006 .
[5] Yacine Challal,et al. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[6] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[7] Imran Memon,et al. Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC) , 2014, Wirel. Pers. Commun..
[8] Hamid Haj Seyyed Javadi,et al. A deterministic Key Predistribution Method for Wireless Sensor Networks Based on Hypercube Multivariate Scheme , 2018 .
[9] Douglas R. Stinson,et al. A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[10] Bülent Yener,et al. Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.
[11] Hamid Haj Seyyed Javadi,et al. Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs , 2014, Secur. Commun. Networks.
[12] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[13] Sushmita Ruj,et al. Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks , 2007, ISPA.
[14] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[15] Imran Memon,et al. A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks , 2015, Wirel. Pers. Commun..
[16] T. Kavitha,et al. Hybrid Design of Scalable Key Distribution for Wireless Sensor Networks , 2010 .
[17] Imran Memon,et al. Travel Recommendation Using Geo-tagged Photos in Social Media for Tourist , 2015, Wirel. Pers. Commun..
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] Panagiotis Papadimitratos,et al. Key splitting: making random key distribution schemes resistant against node capture , 2015, Secur. Commun. Networks.
[20] Tooska Dargahi,et al. Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks , 2015, Secur. Commun. Networks.
[21] Ivan Stojmenovic,et al. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.
[22] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[23] N Shahsavari Pour. Calculating the Project Network Critical Path in Uncertainty Conditions , 2010 .
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[25] Sun Qian,et al. A Novel Key Pre-distribution for Wireless Sensor Networks , 2012 .
[26] Liren Zhang,et al. Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery , 2014, Wireless Personal Communications.
[27] Song Guo,et al. A Flexible and Efficient Key Distribution Scheme for Renewable Wireless Sensor Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[28] K.R. Venugopal,et al. Combinatorial Approach to Key Generation using Multiple Key Spaces for Wireless Sensor Networks , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[29] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[30] I. Anderson. Combinatorial Designs: Construction Methods , 1990 .
[31] Subhamoy Maitra,et al. A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design , 2005, International Journal of Information Security.
[32] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[33] Imran Memon,et al. Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme , 2015, Wirel. Pers. Commun..