Author:
Sharma Gaurav,Bala Suman,Verma Anil K.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference19 articles.
1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.
2. Walters, J., Liang, Z., Shi, W., & Chaudhary, V. (2007). Security in distributed, grid, and pervasive computing, chapter 17 wireless sensor network security: A survey, pp. 1–51. CRC Press.
3. Olariu, S., & Xu, Q. (2005). Information assurance in wireless sensor networks. In Proceedings of the IEEE international symposium on parallel and distributed processing, volume 13, p. 236a. Los Alamitos, CA, USA: IEEE Computer Society.
4. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Advances in cryptology volume 196 of Lecture notes in computer science, pp. 47–53. Berlin, Heidelberg: Springer.
5. Al-Riyami, S., & Paterson, K. (2003). Certificateless public key cryptography. In Advances in cryptology-ASIACRYPT 2003 volume 2894 of Lecture notes in computer science, pp. 452–473. Berlin, Heidelberg: Springer.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献