1 |
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' pp. 189-199, ACM/IEEE Intemation Conference on Mobile Computing and Networking, Jul. 200l
DOI
|
2 |
Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Location-based compromise-tolerant security mechanisms for wireless sensor networks,', vo1.24, no.2, pp.247-260, IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, Feb. 2006
DOI
ScienceOn
|
3 |
W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney, 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' pp.586-597, IEEE INFOCOM 04, Mar. 2004
DOI
|
4 |
L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' pp.41-47. 2002, ACM CCS 02, Nov. 2002
DOI
|
5 |
H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for sensor networks,' pp.197-213, IEEE Symposium on Security and Privacy, May 2003
|
6 |
D. Liu, P. Ning, and R. Li, 'Establishing Pairwise Keys in Distributed Sensor Networks,' pp.41-77, ACM Transactions on Information and System Security, Feb. 2005
DOI
|
7 |
Y. Zhang, W. Liu, W. Lou, Y. Fang, and D. Wu, 'Secure localization and authentication in ultra-wideband sensor networks,' vol.24, no.4, pp.829-835, IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications, Apr. 2006
DOI
ScienceOn
|
8 |
S. Zhu, S. Setia, S. Jajodia, and P. Ning, 'An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,' pp.259-271, Proc. IEEE Symp. Security Privacy, May 2004
DOI
|
9 |
K. Barr and K. Asanovic, 'Energy aware lossless data compression,' pp.231-244, 1st Int. Conf.Mobile Syst., Applicat., Services, May 2003
DOI
|
10 |
D. Boneh, B. Lynn, and H. Shacham, 'Short signatures from the Weil pairing,' pp.514-532, in Proc, Asiacrypt' 01, Lecture Notes in Computer Science, vol. 2248, Dec. 2001
DOI
ScienceOn
|
11 |
'Digital Hash Standard,' federal information processing standards publication 180-1, Apr. 1995
|
12 |
D. J. Malan, M. Welsh, and M. D. Smith, 'A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,' pp.71-80, IEEE SECON 04, Oct. 2004
DOI
|
13 |
W. Du, J. Deng, Y. S. Han, P.K. Varshney, J. Katz, and A. Khalili, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' pp. 228-258, ACM Transactions on Information and System Security, Aug. 2005
DOI
|
14 |
G. Gaubatz, J. Kaps, and B. Sunar, 'Public keys cryptography in sensor networks?revisited', pp.2-18, ESAS 04, Aug. 2004
|
15 |
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, 'Comparing elliptic curve cryptography and RSA on 8-bit CPUS,' pp.119-132, CHES 04, Lecture Notes in Computer Science, vol. 3156, Aug. 2004
|
16 |
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang, 'Energy analysis for public-key cryptography for wireless sensor networks,' IEEE PERCOM 05, Mar. 2005
DOI
|
17 |
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, 'Tinypk: Securing sensor networks with public key technology,' pp.59-64, ACM SASN 04, Oct. 2004
DOI
|
18 |
Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Securing sensor networks with location-based keys,' pp.1909-1914, IEEE WCNC 05, Mar. 2005
DOI
|
19 |
F. Ye, H. Luo, S. Lu, and L. Zhang, 'Statistical en-route filtering of injected false data in sensor networks,' vol.23, no.4, pp.839-850, IEEE JSAC, Special Issue on Self-Orgazing Distributed Collaborative Sensor Networks, Apr. 2005
DOI
ScienceOn
|