On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
暂无分享,去创建一个
[1] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] Amnon Ta-Shma,et al. A combinatorial construction of almost-ramanujan graphs using the zig-zag product , 2008, STOC.
[3] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[4] Johannes Gehrke,et al. Gossip-based computation of aggregate information , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[5] Panganamala Ramana Kumar,et al. Scaling Laws for Ad Hoc Wireless Networks: An Information Theoretic Approach , 2006, Found. Trends Netw..
[6] R. Srikant,et al. Unreliable sensor grids: coverage, connectivity and diameter , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Ronghua Wang,et al. Secure and efficient use of public key cryptography in sensor networks , 2007 .
[8] M. Murty. Ramanujan Graphs , 1965 .
[9] S. Sitharama Iyengar,et al. Optimized broadcast protocol for sensor networks , 2005, IEEE Transactions on Computers.
[10] Ivan Stojmenovic,et al. Performance Evaluation of Broadcasting Protocols for Ad Hoc and Sensor Networks , 2005, Med-Hoc-Net.
[11] Deborah Estrin,et al. Rumor routing algorthim for sensor networks , 2002, WSNA '02.
[12] Ahmed Helmy,et al. Active query forwarding in sensor networks , 2005, Ad Hoc Networks.
[13] Deborah Estrin,et al. Rumor Routing Algorithm For Sensor Networks , 2002 .
[14] Prabhakar Raghavan,et al. The electrical resistance of a graph captures its commute and cover times , 2005, computational complexity.
[15] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[16] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[17] N. Linial,et al. Expander Graphs and their Applications , 2006 .
[18] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[19] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[20] Chen Avin,et al. On the Cover Time of Random Geometric Graphs , 2005, ICALP.
[21] Ahmad Khonsari,et al. A Combinatorial Approach for Key-Distribution in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[22] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[23] Alan M. Frieze,et al. The Cover Time of Random Regular Graphs , 2005, SIAM J. Discret. Math..
[24] Thomas Sauerwald,et al. Cover Time and Broadcast Time , 2009, STACS.