Automatic proof of strong secrecy for security protocols, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.86-100, 2004. ,
DOI : 10.1109/SECPRI.2004.1301317
Survey and benchmark of lightweight block ciphers for wireless sensor networks, pp.543-548, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00918974
On the distribution and revocation of cryptographic keys in sensor networks, IEEE Transaction on Dependable and Secure Computing, vol.2, 2005. ,
Random key predistribution schemes for sensor networks, IEEE, 2003. ,
A scheme for key revocation in wireless sensor networks, International Journal on Advanced Computer Engineering and Communication Technology, vol.1, 2012. ,
Comparing State Spaces in Automatic Security Protocol Analysis, Formal to Practical Security, pp.70-94, 2009. ,
DOI : 10.1007/11805618_21
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, CAV'08, ser. LNCS, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
An Efficient Key Revocation Protocol for Wireless Sensor Networks, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), 2006. ,
DOI : 10.1109/WOWMOM.2006.23
Wsn research activities for military application, Proceedings of the 11th international conference on Advanced Communication Technology, 2009. ,
Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks, EURASIP Journal on Wireless Communications and Networking, vol.8, issue.2, p.151, 2013. ,
DOI : 10.1016/j.ins.2008.05.031
A low-energy key management protocol for wireless sensor networks, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003. ,
DOI : 10.1109/ISCC.2003.1214142
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), 2008. ,
DOI : 10.1109/IPSN.2008.47
WSN -secure comunications with AES algoritms, 2008. ,
Standards for efficient cryptography, sec 1: Elliptic curve cryptography, 2000. ,
A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks, Proceedings of the 9th Joint Conference on Information Sciences (JCIS), 2006. ,
DOI : 10.2991/jcis.2006.314