Computer Science ›› 2013, Vol. 40 ›› Issue (6): 49-51.
Previous Articles Next Articles
HUANG Jin-wang,HU Zhi-hui and FENG Jiu-chao
[1] Estrin D,et al.Instrumenting the World with Wireless Sensor Networks[C]∥Proc.Int’l.Conf.Acoustics,Speech and Signal Processing.Salt Lake City,UT,May 2001 [2] Chan H,Perrig A.Security and Privacy in Sensor Networks[J].IEEE Comp.,2003,36(10):103-105 [3] Shi E,Perrig A.Designing Secure Sensor Networks[J].Wireless Commun,2004,11(6):38-43 [4] Gura N,et al.Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs[C]∥CHES’04:Proc.Wksp.Cryptographic Hardware and Embedded Systems.Aug.2004 [5] Gaubatz G,Kaps J-P,Sunar B.Public Key Cryptogra-phy inSensor Networks-Revisited[C]∥ESAS’04:1st European Wksp.Security in Ad-Hoc and Sensor Networks.2004 [6] Rivest R L.RFC 1321.The MD5message digest algorithm request for comments [S].Cambridge:MIT and RSA Data Security,1992 [7] Nits F P.FIPS PUB 180,Secure hash standard [S].Washington DC:U.S.Department of Commerce,1993 [8] Wang S Y,Feng J C.Chaotic communication scheme by parame-ter division multiple access[J].Acta Electronica Sinica,2007,35(7):35-40 [9] 刘式达,梁福明,刘式适,等.自然科学中的混沌和分形[M].北京:北京大学出版社,2003:1-12,6,31-32,5 [10] 陈帅.无线微传感器网络混沌加密理论及其关键技术研究[D].重庆:重庆大学,2006:55-78 [11] Peng Fei,Qiu Shui-sheng.One-way Hash Functions Based on Iterated Chaotic Systems[C]∥Communications,Circuits and Systems International Conference.2007:1070-1074 [12] Shannon C E.Communication theory of secrecy systems[J].Bell System Technology Journal,1949,28:656-715 [13] 郑世慧,张国艳,杨义先,等.基于混沌的带密钥散列函数安全分析[J].通信学报,2011,32(5):146-152 |
No related articles found! |
|