Classification of symmetric key management schemes for wireless sensor networks, International Journal of Security and Its Applications, 2013. ,
An Optimal Class of Symmetric Key Generation Systems, International Conference on the Theory and Applications of Cryptographic Techniques, 1984. ,
DOI : 10.1007/3-540-39757-4_22
Pike: Peer intermediaries for key establishment in sensor networks, INFOCOM, pp.524-535, 2005. ,
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Computer Aided Verification, 20th International Conference, pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
URL : http://www.cs.rutgers.edu/~tdnguyen/classes/cs671/presentations/Arvind-NEWDIRS.pdf
On the security of public key protocols, Proceedings of the 22Nd Annual Symposium on Foundations of Computer Science, SFCS '81, pp.350-357, 1981. ,
Wsn research activities for military application, Proceedings of the 11th international conference on Advanced Communication Technology, pp.271-274, 2009. ,
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.245-256, 2008. ,
DOI : 10.1109/IPSN.2008.47
WSN -secure comunications with AES algoritms, 2008. ,
Multihop Node Authentication Mechanisms for Wireless Sensor Networks, 13th International Conference, ADHOC- NOW 2014, 2014. ,
DOI : 10.1007/978-3-319-07425-2_30
URL : https://hal.archives-ouvertes.fr/hal-01759853
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC), pp.1-6, 2010. ,
DOI : 10.1109/ICWCSC.2010.5415904
Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000. ,
DOI : 10.1109/SECPRI.2000.848446
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2002. ,
DOI : 10.1145/381677.381696
Standards for efficient cryptography, sec 1: Elliptic curve cryptography, 2000. ,
A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2009. ,
DOI : 10.1109/SAHCN.2009.5168906
A random perturbationbased scheme for pairwise key establishment in sensor networks, ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2007. ,