[1] |
RAGHINI M , MAHESWARI N U , VENKATESH R . Overview on key distribution primitives in wireless sensor network[J]. Journal of Computer Science, 2013,9(5): 543.
|
[2] |
BARUA M P , INDORA M S . Overview of security threats in WSN[J]. International Journal of Computer Science and Mobile Computing,ISSN, 2013,2(7): 422-426.
|
[3] |
ESCHENAUER L , GLIGOR V D . A key-management scheme for distributed sensor networks[A]. Proceedings of the 9th ACM Conference on Computer and Communicalion Security[C]. Washington,DC,USA, 2002. 41-47.
|
[4] |
CHAN H , PERRIG A , SONG D . Random key predistribution schemes for sensor networks[A]. Proceedings of the 2003 Symposium on Security and Privacy[C]. Carnegie Mellon,PA,USA, 2003. 197-213.
|
[5] |
LIU D , NING P . Location-based pairwise key establishments for static sensor networks[A]. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. New York,NY,USA, 2003. 72-82.
|
[6] |
LIU D , NING P , LI R . Establishing pairwise keys in distributed sensor networks[J]. ACM Transactions on Information and System Security(TISSEC), 2005,8(1): 41-77.
|
[7] |
DU W , DENG J , HAN Y S . A key predistribution scheme for sensor networks using deployment knowledge[J]. IEEE Transactions on Dependable and Secure Computing, 2006,3(1): 62-77.
|
[8] |
BLOM R . An optimal class of symmetric key generation systems[A]. Proceedings of the EUROCRYPT 84 Workshop on Advances in Cryptology:Theory and Application of Cryptographic Techniques[C]. New York,USA, 1985. 335-338.
|
[9] |
BLUNDO C , DE SANTIS A , HERZBERG A . Perfectly-secure key distribution for dynamic conferences[A]. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology[C]. London,UK, 1993. 471-486.
|
[10] |
YU C M , LU C S , KUO S Y . Noninteractive pairwise key establishment for sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2010,5(3): 556-569.
|
[11] |
ZHANG W , TRAN M , ZHU S . A random perturbation-based scheme for pairwise key establishment in sensor networks[A]. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing[C]. New York,USA, 2007. 90-99.
|
[12] |
GUO S , LEUNG V , QIAN Z . A permutation-based multi-polynomial scheme for pairwise key establishment in sensor networks[A]. 2010 IEEE International Conference on Proceedings of the Communications(ICC)[C]. Cape Town,SouthAfrica, 2010. 1-5.
|
[13] |
ALBRECHT M , GENTRY C , HALEVI S . Attacking cryptographic schemes based on perturbation polynomials[A]. Proceedings of the 16th ACM Conference on Computer and Communications Security[C]. 2009. 1-10.
|
[14] |
MEIJERING E . A chronology of interpolation:from ancient astronomy to modern signal and image processing[J]. Proceedings of the IEEE, 2002,90(3): 319-342.
|
[15] |
AR S , LIPTON R J , RUBINFELD R . Reconstructing algebraic functions from mixed data[J]. SIAM Journal on Computing, 1998,28(2): 487-510.
|
[16] |
FENG K , YU H . Integers and Polynomials[M]. Beijing: Higher Education Press, 1999.
|
[17] |
GATHEN J . Algebraic complexity theory[J]. Annual Review of Computer Science, 1988,3(1): 317-348.
|
[18] |
GRIGOR'EV D Y E . Factoring polynomials over a finite field and solving systems of algebraic equations[J]. Zapiski Nauchnykh Seminarov POMI, 1984,137: 20-79.
|
[19] |
KALTOFEN E . A polynomial-time reduction from bivariate to univariate integral polynomial factorization[A]. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science[C]. Washington,DC,USA, 1982. 57-64.
|
[20] |
WAN D Q . Factoring multivariate polynomials over large finite fields[J]. Mathematics of Computation, 1990,54(190): 755-770.
|