期刊文献+

An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks 被引量:8

An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks
原文传递
导出
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第2期31-38,共8页 中国邮电高校学报(英文版)
基金 ThisworkwassupportedbytheNaturalScienceFoundationofJiangsuProvince(BK2004218andBK2003106).
关键词 identity-based encryption scheme network security boneh-franklin algorithms wireless sensor network identity-based encryption scheme network security boneh-franklin algorithms wireless sensor network
  • 相关文献

参考文献25

  • 1AKYILDIZ I F,SU W,SANKARASUBRAMANIAM Y.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422.
  • 2PERRIG A,SZEWCZYK R,WEN V,et al.SPINS:Security protocols for sensor networks[C]//Proceedings of Seventh Annual International Conference on Mobile Computing and Networks,Jul 16-21,2001,Rome,Italy.New York,NY,USA:ACM Press,2001:189-199.
  • 3ANDERSON R,KUHN M.Tamper resistance-a cautionary note[C]//Proceedings of the 2nd Usenix Workshop on Electronic Commerce,Nov 18-21,1996,Oakland,CA,USA.SanDiego,CA,USA:USENIX Press,1996:1-11.
  • 4XIAO N,WANG Q.Mechanism of authentication and key agreement in WCDMA[J].Journey of Chongqing University of Posts and Telecommunications,2004,16(2):117 -119.
  • 5ESCHENAUER L,GL IGOR V D.A key-management scheme for distributed sensor net works[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22,2002,Washington,DC,USA.New York,NY,USA:ACM Press,2002:41 -47.
  • 6DI PIETRO R,MANCINI L V,MEI A.Random key assignment for secure wireless sensor networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03),Oct 31,2003,Fairfax,VA,USA.New York,NY,USA:ACM Press,2003:62-71.
  • 7CHAN H,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//Proceedings of IEEE Symposium on Research in Security and Privacy,May 11 -14,2003,Berkeley,CA,USA.Piscataway,NJ,USA:IEEE,2003:197-213.
  • 8LAUTER K.The advantages of elliptic curve cryptography for wireless security[J].IEEE Wireless Communications,2004,11(1):62-67.
  • 9DU W,DENG J,HAN Y S,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 10BLOM R.An optimal class of symmetric key generation systems[C]//Proceedings of Advances in Cryptology(EUROCRYPT 84),Apr 9-11,1985,Paris,France.Berlin,Germany,Springer,1985:335-338.

同被引文献52

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部