B. Blanchet, Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.86-100, 2004.
DOI : 10.1109/SECPRI.2004.1301317

M. Cazorla, K. Marquet, and M. Minier, Survey and benchmark of lightweight block ciphers for wireless sensor networks, pp.543-548, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00918974

H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, On the distribution and revocation of cryptographic keys in sensor networks, IEEE Transaction on Dependable and Secure Computing, vol.2, 2005.

H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, IEEE, 2003.

S. Chattopadhyay and A. K. Turuk, A scheme for key revocation in wireless sensor networks, International Journal on Advanced Computer Engineering and Communication Technology, vol.1, 2012.

C. J. Cremers, P. Lafourcade, and P. Nadeau, Comparing State Spaces in Automatic Security Protocol Analysis, Formal to Practical Security, pp.70-94, 2009.
DOI : 10.1007/11805618_21

C. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, CAV'08, ser. LNCS, 2008.
DOI : 10.1007/978-3-540-70545-1_38

G. Dini and I. Savino, An Efficient Key Revocation Protocol for Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), 2006.
DOI : 10.1109/WOWMOM.2006.23

M. A. Hussain, P. Khan, and K. K. Sup, Wsn research activities for military application, Proceedings of the 11th international conference on Advanced Communication Technology, 2009.

K. Jeong, C. Lee, and J. Lim, Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, vol.8, issue.2, p.151, 2013.
DOI : 10.1016/j.ins.2008.05.031

G. Jolly, M. Kusçu, P. Kokate, and M. Younis, A low-energy key management protocol for wireless sensor networks, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003.
DOI : 10.1109/ISCC.2003.1214142

A. Liu and N. Ning, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), 2008.
DOI : 10.1109/IPSN.2008.47

N. Manica, M. Saloni, and P. Toldo, WSN -secure comunications with AES algoritms, 2008.

C. Research, Standards for efficient cryptography, sec 1: Elliptic curve cryptography, 2000.

C. Wang, T. Hong, G. Horng, and W. Wang, A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks, Proceedings of the 9th Joint Conference on Information Sciences (JCIS), 2006.
DOI : 10.2991/jcis.2006.314