Key infection: smart trust for smart dust, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004., 2004. ,
DOI : 10.1109/ICNP.2004.1348111
Random key predistribution schemes for sensor networks, Proceedings of Symposium on Security and Privacy, pp.197-213, 2003. ,
Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
DOI : 10.1145/358790.358797
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002. ,
DOI : 10.1145/381677.381696
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-199, 2001. ,
DOI : 10.1145/381677.381696
Security for Ubiquitous Computing, 2002. ,