A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks
暂无分享,去创建一个
Rajasekhar Mungara | K. VenkateswaraRao | VenkataSubbaReddy Pallamreddy | Hsiao-Hwa Chen | M. Guizani | Xiaojiang Du | Yang Xiao | Rajasekhar Mungara | K. Venkateswararao | V. Pallamreddy
[1] Flaviu Cristian,et al. The Timed Asynchronous Distributed System Model , 1998, IEEE Trans. Parallel Distributed Syst..
[2] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[3] Xiaoyan Hong,et al. An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[4] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[5] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[6] David E. Culler,et al. Hood: a neighborhood abstraction for sensor networks , 2004, MobiSys '04.
[7] Mingyan Liu,et al. Data-gathering wireless sensor networks: organization and capacity , 2003, Comput. Networks.
[8] Nancy A. Lynch,et al. Consensus in the presence of partial synchrony , 1988, JACM.
[9] Xiaojiang Du,et al. Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..
[10] Michael Ben-Or,et al. Another advantage of free choice (Extended Abstract): Completely asynchronous agreement protocols , 1983, PODC '83.
[11] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[12] Suresh Singh,et al. Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[13] Baltasar Beferull-Lozano,et al. Lossy network correlated data gathering with high-resolution coding , 2005, IEEE Transactions on Information Theory.
[14] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Gautam Borkar. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[17] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] Deborah Estrin,et al. A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.
[19] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[20] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[21] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[22] Xiaojiang Du,et al. Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks , 2006, Int. J. Wirel. Mob. Comput..
[23] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .