共 9 条
- [1] Kerberos: An Authentication Service for Computer Networks. Neuman B C,Ts’ o T. IEEE Communications Letters . 1994
- [2] Constraints and approaches for distributed sensor security. Carman D.W,Kruus P.S,Matt B.J. NAI LabsTechnical Report#00-010 . 2000
- [3] Akey management scheme for distributedsensor networks. ESCHENAUER L,GLIOR VD. Proc of the 9th ACMConference on Com-puter and Communication Security . 2002
- [4] "Localized Algorithms in Wireless Ad-Hoc Networks: Location Discovery and Sensor Exposure". S. Meguerdichian,S. Slijepcevic,V. Karayan,and M. Potkonjak. Proc. ACM MobiHoc‘Ol . 2001
- [5] Random key predistributionschemes for sensor networks. Chan H,Perrig A,Song D. Proceedings of the IEEE Sym-posium on Security and Privacy . 2003
- [6] A pairwise key pre-distribution scheme for wirelesssensor networks. Du Wen-Liang,,Deng Jing,Han Y.S.,Chen Shi-Gang,Varsh-ney P.K. Proceedings of the 10th ACM Conferenceon Computer and Communications Security(CCS) . 2003
- [7] Distributed symmetric key management for mo-bile Ad Hoc networks. Chan A C-F. Proceedings of the INFOCOM 2004,Twentyt-hird Annual Joint Conference of the IEEE Computerand Communications Societies . 2004
- [8] Location detection in emergency sensor networksusing robust identifying codes. Ungrangsi R. . 2003
- [9] A key management scheme for wireless sensor networks using deployment knowledge. W Du,J Deng,Y S Han,P K Varshney. INFOCOM2004,the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies . 2004