A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[2] Abhishek Pandey,et al. A Survey on Wireless Sensor Networks Security , 2010 .
[3] Peter Schwabe,et al. SHA-3 on ARM11 Processors , 2012, AFRICACRYPT.
[4] Douglas R. Stinson,et al. A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[5] John Pham,et al. Lightweight Implementations of SHA-3 Candidates on FPGAs , 2011, INDOCRYPT.
[6] Chih-Chun Chang,et al. Measurement of Energy Costs of Security in Wireless Sensor Nodes , 2007, 2007 16th International Conference on Computer Communications and Networks.
[7] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Eunmi Choi,et al. A High Connectivity Pre-Distribution Key Management Scheme in Grid-Based Wireless Sensor Networks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[10] James Docherty,et al. A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).
[11] Hangyang Dai,et al. An improved polynomial-based key predistribution scheme for wireless sensor networks , 2008, 2008 International Conference on Communications, Circuits and Systems.
[12] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[13] Michael Hutter,et al. Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID , 2013, CHES.
[14] Yacine Challal,et al. A new class of Hash-Chain based key pre-distribution schemes for WSN , 2013, Comput. Commun..
[15] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[16] Yaser Jararweh,et al. Hardware Performance Evaluation of SHA-3 Candidate Algorithms , 2012, J. Information Security.
[17] Bülent Yener,et al. Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.
[18] Taekyoung Kwon,et al. Location-based pairwise key predistribution for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.