1 |
Schneier, B., One-Way Hash Function, Dr. Dobb's Journal,pp. 148-151 September, 1991
|
2 |
Rivest, R., A. Shamir, and L. Adleman, "A method for obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM 21, pp. 120-126, 1978
DOI
ScienceOn
|
3 |
Hu, F., et al., "Secure wireless sensor networks: problems and solutions," J. of SCI, to appear, 2004
|
4 |
Handy M. J., et aI., Low Energy Adaptive "Clustering Hierarchy with Detenninistic Cluster-Head Selection," IEEE, 2002
|
5 |
Wang X. and H. Yu, "How to Break MD5 and Other Hash Functions, Advances in Cryptology-Eurocrypt," '2005, LNCS 3494, Springer-Verlag, pp. 19-35,2005
|
6 |
Bechler M., et al., "A Cluster-Based security architecture for ad hoc networks, II in: Proceedings of IEEE Conference on Computer Communications Hong Kong, March 2004
|
7 |
Perrig A., et aI., "Security in wireless sensor networks," Commun. OF ACM, 47(5), pp. 53-57, June 2004
DOI
ScienceOn
|
8 |
Jamil Ibriq and Imad Mahgoub "Cluster-Based Routing in Wireless Sensor Networks: Issues and Challenges," SPECTS 2004
|
9 |
Karlof C. and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countenneasures," Ad Hoc Networks, vol, 1, issues 2-3(Special Issue on Sensor Network Applications and Protocols), Elsevier, pp. 293-315, Sep.2003
DOI
ScienceOn
|
10 |
Krzysztof Piotrowski et aI., "How public key cryptography influences wireless sensor node lifetime," Proceedings of the fourth ACM workshop on Security of ad-hoc and sensor networks, Alexandria, Virginia, USA, 2006
|
11 |
Gaubatz, G., et al., "Public key cryptography in sensor networks-revisited," 1st European Workshop on Security in Ad-Hoc and Sensor Networs, 2004
|