共 50 条
- [1] An authenticated identity-based key establishment and encryption scheme for wireless sensor networks [J]. J. China Univ. Post Telecom, 2006, 2 (31-38):
- [2] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
- [3] A novel encryption scheme for wireless sensor networks based on identity-based encryption [J]. Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 1 - 7
- [5] An identity-based authenticated key agreement scheme for heterogeneous sensor networks [J]. Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 582 - 586
- [6] Identity-Based Key Agreement and Encryption For Wireless Sensor Networks [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 182 - 189
- [8] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
- [10] An Efficient Identity-Based Deniable Authenticated Encryption Scheme [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919