Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
暂无分享,去创建一个
[1] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[2] Yongge Wang,et al. Public Key Cryptography Standards: PKCS , 2012, ArXiv.
[3] Yong Wang,et al. A security framework for wireless sensor networks utilizing a unique session key , 2008, 2008 5th International Conference on Broadband Communications, Networks and Systems.
[4] Manisha J. Nene,et al. A security framework for military application on infrastructure based wireless sensor network , 2015, 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
[5] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[6] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[7] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[8] Manisha J. Nene,et al. MITE: Memory integrity based trust evaluation in Wireless Sensor Networks , 2015, 2015 International Conference on Communication Networks (ICCN).
[9] Wen Hu,et al. A key distribution protocol for Wireless Sensor Networks , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[10] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[11] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[12] Rajendra S. Deodhar,et al. Algorithm for Autonomous Reorganization of Mobile Wireless Camera Sensor Networks to Improve Coverage , 2015, IEEE Sensors Journal.
[13] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[14] Kouichi Sakurai,et al. Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[16] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.