Author:
Li Fagen,Han Yanan,Jin Chunhua
Funder
National Natural Science Foundation of China (CN)
Fundamental Research Funds for the Central Universities
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference35 articles.
1. Li, F., Zhong, D., & Takagi, T. (2012). Practical identity-based signature for wireless sensor networks. IEEE Wireless Communications Letters, 1(6), 637–640.
2. Wang, C., Jiang, C., Liu, Y., Li, X. Y., & Tang, S. (2014). Aggregation capacity of wireless sensor networks: Extended network case. IEEE Transactions on Computers, 63(6), 1351–1364.
3. Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption). In Advances in cryptology-CRYPTO’97, LNCS 1294 (pp. 165–179). Springer.
4. Kim, I. T., & Hwang, S. O. (2011). An efficient identity-based broadcast signcryption scheme for wireless sensor networks. In 6th International symposium on wireless and pervasive computing-ISWPC 2011 (pp. 1–6). Hong Kong.
5. Babamir, F. S., & Eslami, Z. (2012). Data security in unattended wireless sensor networks through aggregate signcryption. KSII Transactions on Internet and Information Systems, 6(11), 2940–2955.
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献