Min XU,Lin PENG,Haiyun HAN,Nige LI,Zhansheng HOU. Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection[J]. Telecommunications Science, 2016, 32(2): 158-163.
国家商用密码管理办公室. 证书认证系统密码及其相关安全技术规范[EB/OL]. (2005-04-01)[2011-05-09]. .StateCryptography Administration Office of Security Commercial Code Administration. Specifications of cryptography and related security technology for certificate authentication system[EB/OL]. (2005-04-01)[2011-05-09]. .
[2]
王建刚, 王福豹, 渭军 . 加权最小二乘估计在无线传感器网络定位中的应用[J]. 计算机应用研究, 2006(9): 41-43. WANG J G , WANG F B , DUAN W J . Application of weighted least square estimates on wireless sensor network node localization[J]. Application Research of Computers, 2006(9): 41-43.
[3]
State Encryption Administration.SM2 elliptic curve public key cryptography algorithm recommends curve parameters[EB/OL]. [2012-12-22]. .
[4]
LIANG W Q . Research on public key cryptography and its applications based on elliptic curve[J]. Journal of Anhui Radio&TV University, 2011(1): 122-125.
[5]
HANKERSON D , MENEZES A , VANSTONE S . Guide to Elliptic Curve Cryptography[M]. New York:Springer-Verlag, 2004: 75-152.
[6]
WANG Q , REN K , YU S C , et al. Dependable and secure sensor data storage with dynamic integrityassurance[J]. ACM Transactions on Sensor Networks, 2011,8(1): 1-124.