Security in IEEE 802.15.4 cluster based networks
暂无分享,去创建一个
[1] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[4] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[5] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[6] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[7] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[8] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[10] Kathleen J. Mullen,et al. Agricultural Policies in India , 2018, OECD Food and Agricultural Reviews.
[11] Vipul Gupta,et al. Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper) , 2005, PerCom.
[12] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[13] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[14] Jelena V. Misic,et al. Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic , 2006, IEEE Transactions on Parallel and Distributed Systems.