Random walks, universal traversal sequences, and the complexity of maze problems, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979), pp.218-223, 1979. ,
DOI : 10.1109/SFCS.1979.34
SR3 : A secure and resilient reputation-based routing protocol, 2013. ,
DOI : 10.1109/dcoss.2013.33
A Computationally Sound Mechanized Prover for Security Protocols, IEEE Transactions on Dependable and Secure Computing, vol.5, issue.4, pp.193-207, 2008. ,
DOI : 10.1109/TDSC.2007.1005
wireless networks, Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications , DIALM '99, pp.609-616, 2001. ,
DOI : 10.1145/313239.313282
A survey of lightweight-cryptography implementations. Design & Test of Computers, IEEE, vol.24, issue.6, pp.522-533, 2007. ,
Enhancing resiliency against routing layer attacks in wireless sensor networks: Gradient-based routing in focus, International Journal On Advances in Networks and Services, vol.4, issue.1 2, pp.38-54, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00643873
Resiliency of wireless sensor networks: Definitions and analyses, 2010 17th International Conference on Telecommunications, pp.828-835, 2010. ,
DOI : 10.1109/ICTEL.2010.5478822
URL : https://hal.archives-ouvertes.fr/inria-00524365
Toward Resilient Routing in Wireless Sensor Networks: Gradient-Based Routing in Focus, 2010 Fourth International Conference on Sensor Technologies and Applications, pp.478-483, 2010. ,
DOI : 10.1109/SENSORCOMM.2010.77
URL : https://hal.archives-ouvertes.fr/inria-00524370
Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.21-38, 2005. ,
DOI : 10.1145/570645.570648
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Multilevel ??TESLA, ACM Transactions on Embedded Computing Systems, vol.3, issue.4, pp.800-836, 2004. ,
DOI : 10.1145/1027794.1027800
Use of Elliptic Curves in Cryptography, Advances in Cryptology CRYPTO 85 Proceedings, pp.417-426, 1986. ,
DOI : 10.1007/3-540-39799-X_31
Secure Routing for Mobile Ad hoc Networks, Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp.193-204, 2002. ,
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.521-534, 2002. ,
DOI : 10.1145/381677.381696
Energy efficient routing in wireless sensor networks, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), pp.357-361, 2001. ,
DOI : 10.1109/MILCOM.2001.985819