Random sampling key revocation scheme for distributed sensor networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Ling Liu,et al. A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.
[3] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[4] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[5] Jolyon Clulow,et al. Suicide for the common good: a new strategy for credential revocation in self-organizing systems , 2006, OPSR.
[6] Yuan Xue,et al. Maximum supported network coverage area and cost evaluation of key pre-distribution schemes , 2008, PETRA '08.
[7] Reza Azarderakhsh,et al. Key Management for Wireless Sensor Networks Using Trusted Neighbors , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[8] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[9] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[10] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[11] Yuan Xue. Key management schemes for distributed sensor networks , 2008 .
[12] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[13] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[17] Yong Wang,et al. KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[18] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[19] Claude Crépeau,et al. A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.
[20] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[21] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[22] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[23] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..