A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography
暂无分享,去创建一个
[1] Chen Hao,et al. A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[2] Muhammad Khurram Khan,et al. Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.
[3] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Nathan Lewis,et al. Using trust for key distribution and route selection in Wireless Sensor Networks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[6] David J. Malan,et al. Crypto for Tiny Objects , 2004 .
[7] Reza Azarderakhsh,et al. A Key Management Scheme for Cluster Based Wireless Sensor Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[8] Roberto Di Pietro,et al. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.
[9] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[10] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[11] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[12] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[13] Alex Delis,et al. GPS-Free node localization in mobile wireless sensor networks , 2006, MobiDE '06.
[14] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[15] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[16] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[17] Yanhong Ge,et al. The Public Key Encryption to Improve the Security on Wireless Sensor Networks , 2009, 2009 Second International Conference on Information and Computing Science.
[18] Hans Eberle,et al. Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .
[19] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[22] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[23] Dan Boneh,et al. Fast Variants of RSA , 2007 .
[24] Alvin S. Lim,et al. ACAR: Adaptive Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.