Reducing radio energy consumption of key management protocols for wireless sensor networks
暂无分享,去创建一个
Ingrid Verbauwhede | Bo-Cheng Lai | David Hwang | Sungha Pete Kim | I. Verbauwhede | D. Hwang | B. Lai | Sunghae Kim
[1] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] Deborah Estrin,et al. Habitat monitoring: application driver for wireless communications technology , 2001, SIGCOMM LA '01.
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[5] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[6] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[7] Jerry Zhao,et al. Habitat monitoring: application driver for wireless communications technology , 2001, CCRV.
[8] W. Keith Edwards,et al. At Home with Ubiquitous Computing: Seven Challenges , 2001, UbiComp.
[9] Gregory D. Abowd,et al. The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.
[10] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[11] I. Akyildiz. WIRELESS MULTIMEDIA SENSOR NETWORKS : A SURVEY The uthors discusse , 2022 .
[12] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.