参考文献
|
-
Blake, I.,Seroussi, G.,Smart, N.(1999).Elliptic Curves in Cryptography.Cambridge:Cambridge University Press.
-
Bui, N.,Ugus, O.,Dissegna, M.,Rossi, M.,Zorzi, M.(2010).An integrated system for secure code distribution in wireless sensor networks.Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops),Mannheim, Germany:
-
Doh, I.,Lim, J.,Chae, K.(2013).Code updates based on minimal backbone and group key management for secure sensor networks.Mathematical and Computer Modelling,57(11-12),2801-2813.
-
Dutta, P. K.,Hui, J. W.,Chu, D. C.,Culler, D. E.(2006).Securing the deluge network programming system.Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN'06),Nashville, Tennessee, United States:
-
He, D.,Chan, S.,Chen, C.,Bu, J.(2012).Secure and efficient dynamic program update in wireless sensor networks.Security and Communication Networks,5(7),823-830.
-
He, D.,Chen, C.,Chan, S.,Bu, J.(2012).SDRP: A secure and efficient reprogramming protocol for wireless sensor networks.IEEE Transaction on Industrial Electronics,59(11),4155-4163.
-
He, D.,Chen, C.,Chan, S.,Bu, J..Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks.IEEE Transaction on Industrial Electronics,60(11),5348-5354.
-
Hyun, S.,Ning, P.,Liu, A.,Du, W.(2008).Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks.Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08),St. Louis, Missouri, United States:
-
Law, Y.,Zhang, Y.,Jin, J.,Palaniswami, M.,Havinga, P.(2011).Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks.EURASIP Journal on Wireless Communications and Networking,2011,1-22.
-
Lim, C.(2011).Secure code dissemination and remote image management using short-lived signatures in WSNs.IEEE Communication Letter,15(4),362-364.
-
Luo, R. C.,Chen, O.(2012).Mobile sensor node deployment and asynchronous power management for wireless sensor networks.IEEE Transaction on Industrial Electronics,59(5),2377-2385.
-
Menezes, A.(1993).Elliptic Curve Public Key Cryptosystems.Norwell, MA, USA:Kluwer Academic Publishers.
-
Merkle, R.(1980).Protocols for public key cryptosystems.Proceedings of the IEEE Symposium on Security and Privacy,Oakland, California, United States:
-
Parra, C.,Garcia-Macias, J.(2009).A protocol for secure and energy-aware reprogramming in WSN.Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC'09),Leipzig, Germany:
-
Schneier, B.(1996).Applied Cryptography: Protocols, Algorithms, and Source Code in C.New York:John Wiley & Sons.
-
Tan, H.,Zic, J.,Jha, S.,Ostry, D.(2011).Secure multihop network programming with multiple one-way key chains.IEEE Transactions on Mobile Computing,10(1),16-31.
-
Yeo, S.L.,Yap, W.S.,Liu, J.K.,Henricksen, M.(2013).Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions.IEEE Communication Letters,17(8),1521-1523.
-
Zhang, R.,Zhang, Y.,Ren, K.(2009).DP2AC: Distributed privacy-preserving access control in sensor networks.Proceedings of IEEE INFORCOM 2009 (the 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies),Rio de Janeiro, Brazil:
|