共 62 条
- [1] Aboba B., Blunk L., Vollbrecht J., Carlson J., Levkowetz H., Extensible Authentication Protocol (EAP), (2004)
- [2] Aboba B., Simon D., Eronen P., Extensible Authentication Protocol (EAP) Key Management Framework, (2008)
- [3] Bai E., Jiang X, A dynamic key management scheme based on secret sharing for hierarchical wireless sensor networks, TELKOMNIKA, 11, 3, pp. 1514-1523, (2013)
- [4] Bernstein A., Rank One Update and the Google Matrix, (2018)
- [5] Blom R., An optimal class of symmetric key generation systems, Proc. of EUROCRYPT'84, pp. 335-338, (1985)
- [6] Bos J.W., Kaihara M.E., Kleinjung T., Lenstra A.K., Montgomery P.L., On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography, IACR Cryptology ePrint Archive 2009/389, (2009)
- [7] Cao J., Liao L., Wang G., Scalable key management for secure multicast communication in the mobile environment, Pervasive and Mobile Computing, 2, 2, pp. 187-203, (2006)
- [8] Castelluccia C., Spognardi A., Rok: a robust key pre-distribution protocol for multi-phase wireless sensor networks, Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp. 351-360, (2007)
- [9] Catakoglu O., Levi A., Uneven key pre-distribution scheme for multi-phase wireless sensor networks, Information Sciences and Systems, Lecture Notes in Electrical Engineering, 264, (2013)
- [10] Chen C-M., Zheng X., Wu T-Y., A complete hierarchical key management scheme for heterogeneous wireless sensor networks, The Scientific World Journal, 2014, (2014)