An efficient and scalable key management mechanism for Wireless Sensor Networks
暂无分享,去创建一个
[1] Walid Abdallah,et al. An efficient and scalable key management mechanism for wireless sensor networks , 2014, 16th International Conference on Advanced Communication Technology.
[2] Sencun Zhu,et al. Predistribution and local collaboration-based group rekeying for wireless sensor networks , 2009, Ad Hoc Networks.
[3] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[4] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[5] S. Radhakrishnan,et al. Secret Key Cryptography based Security Approach for Wireless Sensor Networks , 2012, 2012 International Conference on Recent Advances in Computing and Software Systems.
[6] Hermann de Meer,et al. Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..
[7] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[8] Poonam Sinha,et al. Clustering Protocols in Wireless Sensor Networks : A Survey 1 st , 2013 .
[9] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[10] Yiying Zhang,et al. A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network , 2013, Int. J. Distributed Sens. Networks.
[11] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[12] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[13] Walid Abdallah,et al. WSN-based flutter control application for aircraft wings structural health monitoring , 2014, SAC.
[14] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[15] Noureddine Boudriga,et al. Border surveillance using sensor based thick-lines , 2013, The International Conference on Information Networking 2013 (ICOIN).
[16] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[17] R. Divya,et al. A novel dynamic key management scheme based on hamming distance for wireless sensor networks , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).
[18] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[19] Gene Tsudik,et al. New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.
[20] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[21] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[22] Pardeep Kumar,et al. An efficient key pre-distribution scheme for wireless sensor network using public key cryptography , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[23] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[24] Xing Zhang,et al. EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..
[25] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[26] Zhong Chen,et al. C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.