8Alfred J. Menezes, Paul C. van Oorschot, Vanstone S A. Handbook of applied Cryptography. Crc Press Series on Discrete Mathematics and Its Applications, 1997.
9WONG,et al. A dynamic user authentication scheme for wireless sensor networks[ A]. Sensor Networks, Ubiquitous, and Trustworthy Computing,2006. IEEE International Conference [ C ]. 2006:244 - 251.
10Carman D W, Kruus P S, Matt B J. Constraints and Approaches for Distributed for Distributed Sensor Network Security. NAI Labs Technical Report, pages 00 - 010. September 1,2000.