Re-examining Probabilistic Versus Deterministic Key Management
暂无分享,去创建一个
Jianwei Huang | Mung Chiang | Dahai Xu | Ruby B. Lee | Jeffrey S. Dwoskin | M. Chiang | Jianwei Huang | R. Lee | Dahai Xu
[1] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[2] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[3] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[4] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[5] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[6] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[7] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.