A new scheme of key distribution using implicit security in Wireless Sensor Networks
暂无分享,去创建一个
[1] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[2] Alasdair McAndrew. Data Encryption Standard (DES) for Sage , 2009 .
[3] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[4] Lars R. Knudsen,et al. Advanced Encryption Standard (AES) - An Update , 1999, IMACC.
[5] Yi Qian,et al. Towards Survivable and Secure Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[6] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[7] Subhash C. Kak,et al. Online data storage using implicit security , 2009, Inf. Sci..
[8] Dharma P. Agrawal,et al. Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[9] Kamlesh Gupta,et al. Security issues in wireless sensor networks , 2010 .
[10] Liu Jian-hui,et al. Research on key management scheme for WSN based on elliptic curve cryptosystem , 2009, 2009 First International Conference on Networked Digital Technologies.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[13] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[14] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[15] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[16] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[17] Yi Qian,et al. A design for secure and survivable wireless sensor networks , 2007, IEEE Wireless Communications.
[18] Donggang Liu,et al. Security mechanisms for wireless sensor networks , 2005 .
[19] Howon Kim,et al. Hash-based Secure Sensor Network Programming Method without Public Key Cryptography , 2006 .
[20] A. Price,et al. A key pre-distribution scheme for wireless sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.
[21] Dawn Song,et al. Key distribution techniques for sensor networks , 2004 .