How to transmit messages via WSN in a hostile environment
暂无分享,去创建一个
[1] Miroslaw Kutylowski,et al. Key Levels and Securing Key Predistribution against Node Captures , 2009, ALGOSENSORS.
[2] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[3] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Marek Klonowski,et al. Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols , 2004, Communications and Multimedia Security.
[6] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[7] Tanmoy Kanti Das,et al. Diverging Keys in Wireless Sensor Networks , 2006, ISC.
[8] Ronald L. Rivest,et al. Chaffing and Winnowing: Confidentiality without Encryption , 2012 .
[9] Marek Klonowski,et al. Forward-Secure Key Evolution in Wireless Sensor Networks , 2007, CANS.