A Key Management Scheme for Radio Frequency Communication Environment
暂无分享,去创建一个
Dongho Won | Seungjoo Kim | Kwangwoo Lee | Young-Jun Cho | Song-Yi Kim | Hanjae Jeong | Wook-Jae Cha | Seungjoo Kim | Dongho Won | Kwang-Woo Lee | Hanjae Jeong | Younga Cho | Songyi Kim | Wook-Jae Cha
[1] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[2] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[3] Dongho Won,et al. Group Key Agreement Protocol Among Mobile Devices in Different Cells , 2006, ISPA Workshops.
[4] Geyong Min. Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings , 2006, ISPA Workshops.
[5] Ingrid Verbauwhede,et al. Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .
[6] Wen-Shenq Juang,et al. Two efficient two-factor authenticated key exchange protocols in public wireless LANs , 2009, Comput. Electr. Eng..
[7] Yi-Chih Hsieh,et al. A New Improved Secure Password Authentication Protocol to Resist Guessing Attack in Wireless Networks , 2008 .
[8] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[9] Bülent Yener,et al. Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.
[10] Chae Hoon Lim. LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[11] Kwangjo Kim,et al. Securing HB+ against GRS Man-in-the-Middle Attack , 2007 .
[12] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[13] Tae-Yeon Kim. A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks , 2009 .
[14] Chris J. Mitchell,et al. Parsing ambiguities in authentication and key establishment protocols , 2010, Int. J. Electron. Secur. Digit. Forensics.