R. Anderson, H. Chan, and A. Perrig, Key infection: smart trust for smart dust, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004., 2004.
DOI : 10.1109/ICNP.2004.1348111

H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, Proceedings of Symposium on Security and Privacy, pp.197-213, 2003.

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

A. J. Menezes, S. A. Vanstone, and P. C. Van-oorschot, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002.
DOI : 10.1145/381677.381696

A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.189-199, 2001.
DOI : 10.1145/381677.381696

F. Stajano, Security for Ubiquitous Computing, 2002.