1 |
L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. 9th ACM Conf. Comput. Comm. Security, 2002, pp. 41-47.
|
2 |
W. Du et al., "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 42-51.
|
3 |
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Adv. Cryptology: Proc. EUROCRYPT'84, 1985, pp. 335-338.
|
4 |
D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 52-61.
|
5 |
W. Du et al., "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Proc. IEEE INFOCOM, 2004, pp. 586-597.
|
6 |
A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Proc. Wireless Netw., vol. 8, Sept. 2002, pp. 521-534.
DOI
ScienceOn
|
7 |
G. Gaubatz et al., "State of the Art in Ultra-low Power Public Key Cryptography for Wireless Sensor Networks," Proc. Third IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 146-150.
|
8 |
A.S. Wander et al., "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 324-328.
|
9 |
X. Li et al., "A Key Distribution Scheme Based on Public Key Cryptography for Wireless Sensor Networks," Proc. Int. Conf. Computational Intelli. Security, ICCIAS, 2006, pp. 1113-1116.
|
10 |
G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
|
11 |
G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
|
12 |
M. Pugliese and F. Santucci, "Pair-Wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks Using Vector Algebra," Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst., 2008, pp. 853-859.
|
13 |
J. Yao, "A Security Architecture for Wireless Sensor Networks Based-On Public Key Cryptography," Proc. Int. Conf. Wireless Comm. Networking Mobile Comput., 2009, pp. 1-3.
|
14 |
J.W. Jiang and J.H. Liu, "Research on Key Management Scheme for WSN Based on Elliptic Curve Cryptosystem," Proc. 1st Int. Conf. Networked Digital Technol., 2009, pp. 536-540.
|
15 |
P. Szczechowiak et al., "NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks," Lect. Notes Comput. Sci., vol. 4913, 2008, pp. 305-320.
|
16 |
T.H. Shan and C.M. Liu, "Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks," Proc. Asia-Pacific Services Comput. Conf., 2008, pp. 1127-1131.
|
17 |
William Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed., New York: Prentice Hall, 2002.
|
18 |
N. Gura et al., "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Proc. 6th Int. Workshop Cryptographic Hardware Embedded Syst., Boston, Mass., vol. 3156. Aug. 2004, pp. 925-943.
|
19 |
D. Malan, M. Welsh, and M.D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," Proc. 1st IEEE Int. Conf. Commun. Netw., Santa Clara, CA, Oct. 2004.
|