An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks
暂无分享,去创建一个
[1] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[2] Hans Eberle,et al. Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .
[3] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.
[4] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[7] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[8] Tassos Dimitriou,et al. Secure and Efficient In-Network Processing for Sensor Networks , 2004 .
[9] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[10] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[11] Deborah Estrin,et al. Building efficient wireless sensor networks with low-level naming , 2001, SOSP.
[12] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[13] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[14] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[15] IntanagonwiwatChalermek,et al. Building efficient wireless sensor networks with low-level naming , 2001 .