Secret Key Revocation in Sensor Networks
暂无分享,去创建一个
[1] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[2] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[3] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[4] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[5] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[6] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..
[7] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[8] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[9] Deborah Estrin,et al. Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.
[10] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[11] Aziz Mohaisen,et al. Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks , 2006, EWSN.
[12] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[13] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[14] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.