Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO)
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] Zheng Huang,et al. A novel dynamic key management scheme for wireless sensor networks , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Hua Yang,et al. A hybrid key management scheme for Heterogeneous wireless sensor networks based on ECC and trivariate symmetric polynomial , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.
[5] E. Jaynes. Information Theory and Statistical Mechanics , 1957 .
[6] André Weimerskirch,et al. A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.
[7] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[8] Goldberg,et al. Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.
[9] Francisco Herrera,et al. Fuzzy connectives based crossover operators to model genetic algorithms population diversity , 1997, Fuzzy Sets Syst..
[10] M. Ramkumar,et al. On the security of random key pre-distribution schemes , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[11] Mohamed Eltoweissy,et al. A study of static versus dynamic keying schemes in sensor networks , 2005, PE-WASUN '05.
[12] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[13] Tzung-Pei Hong,et al. A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKS , 2009 .
[14] Minoru Ito,et al. Localization of a Moving Sensor by Particle Filters , 2007 .
[15] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[16] Xiaozhou Li,et al. Reliable group rekeying: a performance analysis , 2001, SIGCOMM '01.
[17] Candelaria Hernández-Goya,et al. Self-organized authentication architecture for Mobile Ad-hoc Networks , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.
[18] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[19] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[20] Mahalingam Ramkumar,et al. Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[21] A. Price,et al. A key pre-distribution scheme for wireless sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.
[22] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[23] Goo Yeon Lee,et al. Efficient rekey interval for minimum cost on secure multicast system using group key , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[24] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..