1. Security for Ubiquitous Computing;Stajano,2002
2. D.D. Hwang, B.C.C. Lai, I. Verbauwhede, Energy-memory-security tradeoffs in distributed sensor networks, ADHOC-NOW 2004, LNCS, vol. 3158, 2004.
3. N.R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, Analyzing the energy consumption of security protocols, in: ISLPED ’03, Proceedings of the 2003 international Symposium on Low Power Electronics and Design, ACM, Korea, 2003, pp. 30–35. .
4. Unleashing public-key cryptography in wireless sensor networks;Lopez;Journal of Computer Security,2006
5. A.S. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: PERCOM ’05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, IEEE Computer Society, Washington, DC, USA, 2005, pp. 324–328. .