Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks
暂无分享,去创建一个
[1] Alan Bundy,et al. Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.
[2] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[3] Keith M. Martin,et al. An Application-Oriented Framework for Wireless Sensor Network Key Establishment , 2008, Electron. Notes Theor. Comput. Sci..
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] Jang-Ping Sheu,et al. Pair-wise path key establishment in wireless sensor networks , 2007, Comput. Commun..
[6] Francesco Palmieri,et al. Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[7] Feng Xia,et al. Energy-efficient opportunistic localization with indoor wireless sensor networks , 2011, Comput. Sci. Inf. Syst..
[8] Xue Wang,et al. Distributed Energy Optimization for Target Tracking in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[11] Xuanjing Shen,et al. An improved node localization algorithm based on DV-Hop for wireless sensor networks , 2011, Comput. Sci. Inf. Syst..
[12] Dharma P. Agrawal,et al. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.
[13] Chin-Ling Chen,et al. A Novel Key Management of Two-Tier Dissemination for Wireless Sensor Network , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.