Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment
暂无分享,去创建一个
[1] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[2] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[3] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Roberto Di Pietro,et al. Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.
[6] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[7] Charles J. Colbourn,et al. Quorum Systems Constructed from Combinatorial Designs , 2001, Inf. Comput..
[8] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[9] Shivakant Mishra,et al. Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.
[10] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[11] Sheau-Dong Lang. A Torus Quorum Protocol for Distributed Mutual Exclusion , 2002 .
[12] Mani Srivastava,et al. Overview of sensor networks , 2004 .
[13] Mohamed F. Younis,et al. A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[14] Shivakant Mishra,et al. Enhancing Base Station Security in Wireless Sensor Networks , 2003 .