Computer Science ›› 2013, Vol. 40 ›› Issue (Z11): 4-7.
Previous Articles Next Articles
ZHANG Xu-bin and LIU Zhi-hong
[1] Chen Xiang-qian,Makki K,Yen Kang,et al.Sensor network security:a survey [J].IEEE Communications Surveys & Tuto-rials,Second Quarter 2009,11(2):52-73 [2] Ma Di,Tsudik G.Extended abstract:Forward-secure sequential aggregate authentication[C]∥IEEE Symposium on Security and Privacy,2007.Berkeley,CA:IEEE,2007:86-91 [3] Di Pietro R,Mancini L V,Soriente C,et al.Catch me (if you can):Data survival in unattended sensor networks[C]∥Sixth Annual IEEE International Conference on Pervasive Computing and Communications,PerCom’ 08,2008.Hong Kong:IEEE,2008:185-194 [4] Ma Di,Tsudik G.Dish:Distributed self-healing (in unattended sensor networks)[C]∥ SSS 2008,LNCS 5340,2008.Berlin Heidelberg:Springer-Verlag,2008:47-62 [5] Rasheed A,Mahapatra R N.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks [J].IEEE Transa-ctions on Parallel and Distributed Systems,2012,23(5):958-965 [6] Zhang Wen-sheng,Song Hui,Zhu Sen-cun,et al.Least privilege and privilege deprivation:towards tolerating mobile sink compromises in wireless sensor networks[C]∥Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc’ 05),2005.New York,NY,USA:ACM,2005:378-389 [7] Liu Zhi-hong,Ma Jian-feng,Huang Qi-ping,et al.Asymmetrickey pre-distribution scheme for sensor networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1366-1372 [8] Leighton T,Micali S.Secret-key agreement without public-key cryptography[C]∥Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology(CRYPTO’ 93),1993.London,UK:Springer-Verlag,1993:456-479 |
No related articles found! |
|