A Key Management Scheme based on Cluster Grouping Structure for Mobile Networks
暂无分享,去创建一个
[1] Po-Jen Chuang,et al. A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks , 2010, J. Inf. Sci. Eng..
[2] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[3] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[4] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[5] E. Munivel,et al. Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).