Author:
Faisal Mohammed,Muhtadi Jalal Al,Al-Dhelaan Abdullah
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)
2. Sen, J.: A survey on wireless sensor network security. Arxiv preprint arXiv:1011.1529 (2010)
3. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64 (2004)
4. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
5. Diffie, W., Hellman, M.E.: ‘New directions in cryptography. Secure Communications and Asymmetric Cryptosystems, 143–180 (1982)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cluster Based Authentication Scheme for Wireless Multimedia Sensor Networks;Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '16;2016
2. Integrated Protocols to Ensure Security Services in Wireless Sensor Networks;International Journal of Distributed Sensor Networks;2013-07-01