1 |
G. Jolly, M. C. Kuscu, P. Kokate and M. Younis, 'A Low-Energy Key Management Protocol for Wireless Sensor Networks,' Proc. of the 8th IEEE International Symposium on Computers and Communication, 2003
DOI
|
2 |
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck and M. B. Srivastava, 'On Communication Security in Wireless Ad-Hoc Sensor Network,' Proc. of WETICE, pp.139-144, 2002
|
3 |
D. Liu and P. Ning, 'Establishing Pairwise Keys in Distributed Sensor Networks,' Proc. of the 10th ACM Conference on CCS, pp.52-61, 2003
DOI
|
4 |
H. Chan, A. Perrig and D. Song, 'Random Key Predistribution Schemes for Sensor Networks,' Proc. of IEEE Symposium on Security and Privacy, pp.197-213, 2003
|
5 |
S. Zhu, S. Setia and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' Proc. of the 10th ACM Conference on CCS, pp.210-217, 2003
DOI
|
6 |
J. D. Richard and S. Mishra, 'Security Support for In-Network Processing in Wireless Sensor Network,' Proc. of ACM Workshop on SASN, pp.83-93, 2003
DOI
|
7 |
D. Braginsky and D. Estrin, 'Rumor Routing Algorithm For Sensor Networks,' Proc. of the First ACM International Workshop in Wireless Sensor Networks and Applications, pp.22-31, 2002
DOI
|
8 |
L. Eschenauer and V. D. Gligor, 'A Key-Management Scheme for Distributed Sensor Networks,' Proc. of the 9th ACM Conference on CCS, pp.41-47, 2002
DOI
|
9 |
M. Tubaishat, J. Yin, B. Panja and S. Madria, 'A Secure Hierarchical Model for Sensor Network,' Proc. of ACM SIGMOD Record, Vol.33, No.1, pp.7-13, 2004
DOI
ScienceOn
|
10 |
S. Doshi and A. Eswaran, 'A Hierarchical Security Architecture for Group Communication in Sensor Network,' Project Report, 2003
|
11 |
M. Bohge and W. Trappe, 'An Authentication Framework for Hierarchical Ad-Hoc Sensor Networks,' Proc. of ACM Workshop on Wireless Security, pp.79-87, 2003
DOI
|