A key predistribution scheme for sensor networks using deployment knowledge
暂无分享,去创建一个
Yunghsiang Sam Han | Pramod K. Varshney | Wenliang Du | Jing Deng | P. Varshney | Wenliang Du | Y. Han | Jing Deng
[1] S. Leigh,et al. Probability and Random Processes for Electrical Engineering , 1989 .
[2] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] M. Beller,et al. Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .
[5] Natsume Matsuzaki,et al. Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[8] Randy H. Katz,et al. Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.
[9] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[10] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[11] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[12] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[13] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[14] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[15] Kaoru Kurosawa,et al. On Key Distribution and Authentication in Mobile Radio Networks , 1994, EUROCRYPT.
[16] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[17] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[18] R. Srikant,et al. Unreliable sensor grids: coverage, connectivity and diameter , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[19] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[20] József Balogh,et al. On k-coverage in a mostly sleeping sensor network , 2004, MobiCom '04.
[21] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[22] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[23] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[24] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[25] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[26] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[27] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[28] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[29] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[30] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[31] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[32] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.