共 16 条
[1]
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[2]
[Anonymous], P IEEE INT C MOB ADH
[3]
Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471
[4]
Du W., 2004, INFOCOM 2004 23 ANN
[5]
LAI B, 2002, IEEE WORKSH LARG SCA
[6]
Lamont L, 2011, PROCEEDINGS OF SENSORCOMM 2011, THE FIFTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS, P288
[7]
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
[J].
2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS,
2008,
:245-256
[9]
Shorey R., 2006, MOBILE WIRELESS SENS
[10]
Self-healing key distribution with revocation
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:241-257