暂无分享,去创建一个
[1] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[2] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[3] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[4] Hans Eberle,et al. Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .
[5] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[6] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[7] Chae Hoon Lim. Secure Code Dissemination and Remote Image Management Using Short-Lived Signatures in WSNs , 2011, IEEE Communications Letters.
[8] Mohammad Reza Aref,et al. Toward an energy efficient PKC-based key management system for wireless sensor networks , 2014, ISC Int. J. Inf. Secur..
[9] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[10] Kyung-Ah Shim,et al. EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.
[11] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[12] Vijay Varadharajan,et al. Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..
[13] Mohammad Reza Aref,et al. A novel and low-energy PKC-based key agreement protocol for WSNs , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).
[14] Bin Zhao,et al. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks , 2008, Comput. Commun..
[15] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[16] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[17] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[18] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[19] Mohsen Guizani,et al. PKC Based Broadcast Authentication using Signature Amortization for WSNs , 2012, IEEE Transactions on Wireless Communications.
[20] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.