An efficient scheme for authenticating public keys in sensor networks
暂无分享,去创建一个
[1] Bülent Yener,et al. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.
[2] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[3] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[6] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[7] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[8] Deep Medhi,et al. Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.
[9] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[10] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[13] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[14] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[15] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[16] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[17] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[18] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[19] S. Leigh,et al. Probability and Random Processes for Electrical Engineering , 1989 .
[20] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[21] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[22] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[23] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[24] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[25] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[26] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.