An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks
暂无分享,去创建一个
[1] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Vijay Varadharajan,et al. Security for cluster based ad hoc networks , 2004, Comput. Commun..
[4] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[5] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[6] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[7] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[8] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[9] Qian Tian,et al. A NEW METHOD OF NOISE REMOVAL FOR BODY VIBRATION SIGNALS IN WIRELESS SENSOR NETWORKS , 2006 .
[10] Neng-Chung Wang,et al. A hierarchical key management scheme for secure group communications in mobile ad hoc networks , 2007, J. Syst. Softw..
[11] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[12] Chin-Chen Chang,et al. Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..
[13] Min-Shiang Hwang,et al. Threshold Signatures: Current Status and Key Issues , 2005, Int. J. Netw. Secur..
[14] Minoru Ito,et al. Localization of a Moving Sensor by Particle Filters , 2007 .
[15] Fei Hu,et al. Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.
[16] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[17] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[18] Xuemin Shen,et al. Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.
[19] Mohamed Eltoweissy,et al. Key management for long-lived sensor networks in hostile environments , 2007, Comput. Commun..
[20] Yau-Hwang Kuo,et al. eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.
[21] Falko Dressler. Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..
[22] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[23] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[24] Fei Hu,et al. Scalable Security in Wireless Sensor and Actuator Networks ( WSANs ) , 2005 .
[25] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[26] Hiroshi Mineno,et al. An Energy-Aware Routing Scheme with Node Relay Willingness in Wireless Sensor Networks , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[27] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[28] Jang-Ping Sheu,et al. Pair-wise path key establishment in wireless sensor networks , 2007, Comput. Commun..
[29] Issa M. Khalil,et al. Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks , 2007, Ad Hoc Networks.
[30] Chris McDonald,et al. Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks , 2006, Int. J. Netw. Secur..
[31] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[32] Cheng-Chi Lee,et al. Password Authentication Schemes: Current Status and Key Issues , 2006, Int. J. Netw. Secur..
[33] H. Thompson,et al. FAULT CLASSIFICATION BASED UPON SELF ORGANIZING FEATURE MAPS AND DYNAMIC PRINCIPAL COMPONENT ANALYSIS FOR INERTIAL SENSOR DRIFT , 2007 .
[34] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .