Author:
Kim Min-Sik,Park Seung-Kyu,Kim Hyo-Seong,Hwang Kwang-il
Reference16 articles.
1. Vamsi, P.R., Kant, K.: A taxonomy of key management schemes of wireless sensor networks. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT), vol. 690(696), pp. 21–22 (2015)
2. Bala, S., Sharma, G., Verma, A.K.: Classification of Symmetric Key Management Schemes for Wireless Sensor Network. International Journal of Security and Its Applications 7(2), March 2013
3. Lee, J., Stinson, D.R.: Deterministic key pre-distribution schemes for distributed sensor networks. In: ACM Symposium on Applied Computing 2004, Waterloo, Canada. Lecture Notes in Computer Science, vol. 3357, pp. 294–307 (2004)
4. Blom, R.: Theory and application of cryptographic techniques. In: Proceedings of the Eurocrypt 84 Workshop on Advances in Cryptology, pp. 335–338. Springer, Berlin (1984)
5. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)