Computer Science ›› 2015, Vol. 42 ›› Issue (2): 100-102.doi: 10.11896/j.issn.1002-137X.2015.02.021
Previous Articles Next Articles
GUO Ping, FU De-sheng, CHENG Ya-ping and ZHAN Xiang
[1] Gura N,Patel A,Wander A,et al.Comparing Elliptic CurveCryptography and RSA on 8bit CPUs[J].CHES,2004(8):11-13 [2] Hill J,Szewczyk R,Woo R,et al.System Architecture Directions for Networked Sensors[C]∥Proceeding of Architectural Support for Programming Languages and Operating Systems.Quintana Roo,USA:IEEE Publisher,2000:93-104 [3] Malan D J,Welsh M,Smith M D.Implementing Public-Key Infrastructure for Sensor Networks [J].ACM Transactions on Sensor Networks,2008,4(4):1-23 [4] Levis P,Madden S,Polastre J,et al.TinyOS:An operating system for sensor networks [EB/OL].2004-6-18[2014-7-9].http://www.cs.berkeley.edu/~culler/AIIT/papers/TinyOS/levis06tinyos.pdf [5] Watro R,Kong D,Sue F C,et al.TinyPK:Securing Sensor Networks with Public Key Technology[C]∥Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.Miami,USA:IEEE Publisher,2004:59-64 [6] Benenson Z,Gedicke N,Raivio O.Realizing Robust User Au-thentication in Sensor Networks[C]∥Proceedings of Workshop on Real-World Wireless Sensor Networks.LNSC4582, Palma de Mallorca,Spain:Springer-Verlag,2005:556-566 [7] Zhou Y,Zhang Y,Fang Y.Access Control in Wireless Sensor Networks [J].Ad hoc Networks,2007(5):3-13 [8] Oliveira L B,Dahab R,Lopez J.Identity-Based Encryption forSensor Networks[C]∥Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.San Francisco,USA:IEEE Publisher,2012:290-294 [9] Cheng Hai-bin,Yang Guan.An Authenticated Identity-basedKey Establishment and Encryption Scheme for Wireless Sensor Networks[J].The Journal of China Universities of Posts and Telecommunications,2012,13(2):31-38 [10] Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]∥Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology.London,Britain:Springer-Verlag,2001:213-229 [11] 杨庚,程宏兵.一种有效的无线传感器网络密钥协商方案[J].电子学报,2008,36(7):1389-1395 [12] Zhang Yi-he,Liu Wei,Lou Wu Jun,et al.Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks[J].IEEE Journal on Selected Areas in Communications,2013,24(2):247-260 [13] Kampanakis P T.Identity-based Cryptography Feasibility &Applications in Next Generation Sensor Networks[EB/OL].2011-11-6 [2014-7-9].http://www.lib.ncsu.edu/theses/available/etd-08042007-125351/unrestricted/etd.pdf [14] Dong Xiao-lei,Wei Li-fei,Zhu Hao-jin,et al.EP2DF:an efficient privacy-preserving date-forwarding scheme for service-oriented vehicular Ad hoc networks[J].IEEE Transactions on Vehicular Technology,2011,60(2):580-591 [15] 郭萍,傅德胜,朱节中,等.无线MESH轻量级容侵方案[J].计算机科学,2013,40(12):200-206 [16] Brown D R.SEC 2:Recommended Elliptic Curve Domain Parameters[EB/OL].2011-11-8[2014-7-10].http://www.secg.org/download/aid-784/sec2-v2.pdf [17] Burrows M,Abadi M,Needham R.Logic of Authentication [J].ACM Transactions on Computer Systems,1990(8):18-36 |
No related articles found! |
|