Author:
Delgado-Mohatar Oscar,Sierra José M.,Brankovic Ljiljana,Fúster-Sabater Amparo
Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: Proc. of ICNP 2004 (October 2004)
2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of Symposium on Security and Privacy, pp. 197–213 (2003)
3. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
4. Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)
5. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献