Analysis for Location-Based Key Pre-distribution in Wireless Sensor Networks
暂无分享,去创建一个
[1] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[2] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[4] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[5] S. Manesis,et al. A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[6] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[7] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[8] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[9] Hui Tang,et al. Modeling on Secure Data Aggregation of Wireless Sensor Networks Based on Evaluation of Creditability , 2010, 2010 International Conference on Internet Technology and Applications.
[10] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[11] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[12] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[13] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.