A key predistribution scheme for sensor networks using deployment knowledge
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[2] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[4] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[5] József Balogh,et al. On k-coverage in a mostly sleeping sensor network , 2004, MobiCom '04.
[6] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[7] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[8] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[9] P. Ning,et al. Establishing pairwise keys in distributed sensor networks , 2003, CCS '03.
[10] Sencun Zhu,et al. LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.
[11] R. Srikant,et al. Unreliable sensor grids: coverage, connectivity and diameter , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[13] Laurent Eschenauer,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[14] J. D. Tygar,et al. SPINS: Security Protocols for Sensor Networks , 2001, ACM/IEEE International Conference on Mobile Computing and Networking.
[15] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[16] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[17] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[18] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[19] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.
[20] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[21] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[22] Kaoru Kurosawa,et al. On Key Distribution and Authentication in Mobile Radio Networks , 1994, EUROCRYPT.
[23] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .
[24] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[25] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[26] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[27] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[28] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[29] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[30] Deborah Estrin,et al. Next Century Challenges: Mobile Networking for Smart Dust , 1999, MobiCom 1999.
[31] S. Leigh,et al. Probability and Random Processes for Electrical Engineering , 1989 .