Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks
暂无分享,去创建一个
[1] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[2] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[3] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Douglas R. Stinson,et al. Two attacks on a sensor network key distribution scheme of Cheng and Agrawal , 2008, J. Math. Cryptol..
[7] F. B. Hildebrand,et al. Introduction To Numerical Analysis , 1957 .
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Donggang Liu,et al. Group-based key predistribution for wireless sensor networks , 2008, TOSN.
[10] Ashok Kumar Das. An efficient random key distribution scheme for large-scale distributed sensor networks , 2011, Secur. Commun. Networks.
[11] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[12] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[13] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[14] Ashok Kumar Das. A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks , 2009, J. Comput..
[15] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[16] Ashok Kumar Das,et al. An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[17] J. Stoer,et al. Introduction to Numerical Analysis , 2002 .
[18] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[19] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[20] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[21] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[22] Juanru Li,et al. Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks , 2008, Comput. Commun..
[23] William Stallings,et al. Cryptography and network security , 1998 .
[24] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[25] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[26] Ashok Kumar Das,et al. An Identity Based Key Management Scheme in Wireless Sensor Networks , 2011, ArXiv.
[27] Mohamed Eltoweissy,et al. SECK: survivable and efficient clustered keying for wireless sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[28] Rabi N. Mahapatra,et al. Secure Data Collection Scheme in Wireless Sensor Network with Mobile Sink , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.
[29] Ashok Kumar Das. An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..
[30] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[31] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[32] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[33] Yongge Wang,et al. Robust key establishment in sensor networks , 2004, SGMD.
[34] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[35] Mohamed F. Younis,et al. A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[36] NingPeng,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005 .
[37] Mohamed Eltoweissy,et al. A study of static versus dynamic keying schemes in sensor networks , 2005, PE-WASUN '05.
[38] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[39] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[40] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[41] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[42] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.