共 13 条
- [1] Hubaux J.P., Buttyan L., Capkun S., The quest for security in mobile Ad hoc networks, ACM Symposium on Mobile Ad hoc Networking and Computing, pp. 146-155, (2001)
- [2] Shoup V., Practical threshold signatures, Proc of Advances in Cryptology, Eurocrypt'00, pp. 207-220, (2000)
- [3] Perrig A., Szewczyk R., Wen V., Et al., SPINS: Security protocols for sensor networks, Mobile Computing and Networking, pp. 189-199, (2001)
- [4] Cheng B., Sungha D., Reduce radio energy consumption of key management protocol for wireless sensor networks, ISLPED'04, (2004)
- [5] Ronald W., Derrick K., Sue-Fen C., Et al., TinyPK: Securing sensor networks with public key technology, Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 59-64, (2004)
- [6] Huang Q., Cukier J., Kobayashi H., Et al., Fast authenticated key establishment protocols for self-organizing sensor networks, Proceedings of 2nd ACM Workshop on Wireless Sensor Networks and Applications, pp. 141-150, (2003)
- [7] Du W.-L., Wang R.-H., Ning P., An efficient scheme for authenticating public keys in sensor networks, MobiHoc'05, pp. 58-67, (2005)
- [8] Johann G., Alexander S., Stefan T., The Energy cost of cryptographic key establishment in wireless sensor networks (extended abstract), ASIACCS'07, pp. 380-382, (2007)
- [9] Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, (2002)
- [10] Alan P., Kristie K., Samir C., A secure key management scheme for sensor networks, Proceeding of the 10th Americas Conference on Information System, pp. 1739-1745, (2004)