Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
暂无分享,去创建一个
[1] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[2] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[3] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[4] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[5] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[6] Bülent Yener,et al. Key distribution mechanisms for wireless sensor networks : a survey , 2005 .
[7] Douglas R. Stinson,et al. Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.
[8] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.
[9] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[10] Yunghsiang Sam Han,et al. A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.
[11] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[12] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[13] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[14] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[15] Ingrid Verbauwhede,et al. Energy-Memory-Security Tradeoffs in Distributed Sensor Networks , 2004, ADHOC-NOW.
[16] Moti Yung,et al. Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[17] Dieter Gollmann,et al. Computer Security – ESORICS 2004 , 2004, Lecture Notes in Computer Science.
[18] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[19] Rodrigo Roman,et al. Service-Oriented Security Architecture for CII based on Sensor Networks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).