Construction of Trusted Wireless Sensor Networks with Lightweight Bilateral Authentication
暂无分享,去创建一个
[1] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[2] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[3] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[4] Li Jian. Lite-CA based key pre-distribution scheme in wireless sensor network , 2009 .
[5] Yuh-Min Tseng,et al. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices , 2010, Comput. J..
[6] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[7] Ren Yi. Certificateless Authentication for Trusted Key Sharing in Trusted Database , 2010 .
[8] Geng Yang,et al. An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks , 2006 .
[9] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[10] Yang Geng. A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms , 2007 .
[11] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[12] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[13] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[14] Mario Di Francesco,et al. Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.