1. D.W. Carman, P.S. Kruus, B.J. Matt, Constraints and Approaches for Distributed Sensor Network Security, NAI Labs, Tech. Report 00-010, 2000.
2. N. Gura, et al., Comparing elliptic curve cryptography and RSA on 8-bit CPUs, CHES ’04, in: Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, August 2004.
3. A.S. Wander, et al., Energy analysis of public-key cryptography for wireless sensor networks, PerCom ’05, in: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communication, March 2005.
4. K. Piotrowski, P. Langendoerfer, S. Peter, How public key cryptography influences wireless sensor node lifetime, SANS’ 06 Virginia, USA, October 2006.
5. D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, Proceedings of the First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, October 2004.