Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks
暂无分享,去创建一个
Lein Harn | Ou Ruan | Ching-Fang Hsu | Mao-Yuan Zhang | L. Harn | Chingfang Hsu | Ou Ruan | Maoyuan Zhang
[1] Ivan Stojmenovic,et al. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.
[2] I. Downnard. Public-key cryptography extensions into Kerberos , 2003 .
[3] Bahram Honary,et al. Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks , 2012, IET Wirel. Sens. Syst..
[4] R. J. D'Souza,et al. Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks , 2012, IEEE Sensors Journal.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[7] Wei-Chi Ku. Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture , 2005, IEEE Transactions on Neural Networks.
[8] Jong Wook Hong,et al. Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService , 2010, IEEE Transactions on Mobile Computing.
[9] Reza Azarderakhsh,et al. Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[10] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[12] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[13] Donald Ervin Knuth,et al. The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .
[14] Rolf Blom,et al. Non-Public Key Distribution , 1982, CRYPTO.
[15] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[16] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[17] Lein Harn,et al. Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[18] Sriram Chellappan,et al. Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.
[19] Lein Harn,et al. Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications , 2011, IEEE Transactions on Wireless Communications.
[20] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.