Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Carman, D., Kruus, P., Matt, B.J.: Constraints and approaches for distributed sensor network security. Tech. Rep. 00-010, NAI Labs (June 2000)
2. Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. ACM/IEEE Transactions on Networking 11 (February 2002)
3. Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure pebblenet. In: Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2001, pp. 156–163 (October 2001)
4. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47 (2002)
5. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (May 2003)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献