A method of secure data transmission in WSN based on certificateless signature technology
暂无分享,去创建一个
[1] Zhao Li-yib. Authentication scheme based on certificateless signcryption in proxy mobile IPv6 network , 2012 .
[2] Wenchao Huang,et al. Node behavior and identity-based trusted authentication in wireless sensor networks: Node behavior and identity-based trusted authentication in wireless sensor networks , 2013 .
[3] Wang Yu-min. Authentication and Key Negotiation Protocol Between Two Nodes of Wireless Sensor Networks , 2008 .
[4] Yupu Hu,et al. Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..
[5] Zou Chang-zhong. Based on Node ID Confirmation Defend DoS Attacks in Wireless Sensor Networks , 2010 .
[6] Fagen Li,et al. Certificateless hybrid signcryption , 2013, Math. Comput. Model..
[7] Hui Li,et al. Efficient Certificateless Hybrid Signcryption: Efficient Certificateless Hybrid Signcryption , 2011 .
[8] C. Pandu Rangan,et al. Security Weaknesses in Two Certificateless Signcryption Schemes , 2010, IACR Cryptol. ePrint Arch..