An Identity-Based Authentication Protocol for Clustered ZigBee Network
暂无分享,去创建一个
Wei Chen | Dong Tian | Zetian Fu | Xiaoshuan Zhang | Wei Chen | Xiaoshuan Zhang | Zetian Fu | D. Tian
[1] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Chunming Rong,et al. ZigBee Security Using Identity-Based Cryptography , 2007, ATC.
[4] Jae-Hyun Kim,et al. Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[5] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[6] Sheng Zhong,et al. Body sensor network security: an identity-based cryptography approach , 2008, WiSec '08.
[7] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[8] Myung J. Lee,et al. Toward Secure Low Rate Wireless Personal Area Networks , 2006, IEEE Transactions on Mobile Computing.
[9] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[10] Danny Dolev,et al. On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.
[11] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[12] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[13] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[14] Flemming Nielson,et al. A secure key establishment protocol for zigbee wireless sensor networks , 2009, 2009 24th International Symposium on Computer and Information Sciences.