[1] |
ASOKAN N , GINZBOORG P . Key agreement in ad hoc networks[J]. Computer Communications, 2000,23(17): 1627-1637.
|
[2] |
WONG C K , GOUDA M , LAM S S . Secure group communications using key graphs[J]. IEEE/ACM Transactions on Networking, 2000,8(1): 16-30.
|
[3] |
SHERMAN A T , MCGREW D A . Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003,29(5): 444-458.
|
[4] |
DU X , WANG Y , GE J , et al. An ID-based broadcast encryption scheme for key distribution[J]. IEEE Transactions on Broadcasting, 2005,51(2): 264-266.
|
[5] |
YANG G , WANG J , CHENG H , et al. An identity-based encryption scheme for broadcasting[A]. NPC 2007[C]. Dalian,China, 2007. 123-126.
|
[6] |
ZHANG Y H N M L Y . Identity-based boradcast encryption with shorter transmissions[J]. Journal of Shanghai Jiaotong University(Science), 2008,13(6): 641-645.
|
[7] |
JIANG Y X , LIN C , SHI M H , et al. Self-healing group key distribution with time-limited node revocation for wireless sensor networks[J]. Security Issues in Sensor and Ad Hoc Networks, 2007,5(1): 14-23.
|
[8] |
DUTTA R , CHANG E C , MUKHOPADHYAY S , et al. Efficient selfhealing key distribution with revocation for wireless sensor networks using one way key chains[A]. LNCS 4521[C]. Zhuhai,China, 2007. 385-400.
|
[9] |
冯涛, 马剑锋 . 基于单向累加器的移动 ad hoc网络组密钥管理方案[J]. 通信学报, 2007,28(11A):103-107. FENG T , MA J F . One-way accumulators based group key agreement scheme for mobile ad hoc network[J]. Journal on Communications, 2007,28(11A):103-107.
|
[10] |
马春光, 王九如, 钟晓睿 等. 基于单向累加器的传感网密钥管理协议[J]. 通信学报, 2011,31(11A):184-189. MA C G , WANG J R , ZHONG X R , et al. One-way accumulators-based key management protocol for wireless sensor networks[J]. Journal on Communications, 2011,31(11A):184-189.
|
[11] |
马春光, 蔡满春, 武朋 . 基于单向累加器的无向可传递闭包图认证[J]. 通信学报, 2008,29(3):63-69. MA C G , CAI M C , WU P . Transitively closed undirected graph authentication based on one-way accumulators[J]. Journal on Communications, 2008,29(3):63-69.
|
[12] |
BENALOH J , MARE M D . One-way accumulators:a decentralized alternative to digital signatures[A]. EUROCRYPT'93 Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology[C]. New York,USA, 1994. 274-285.
|
[13] |
BARIC N , PFITZMANN B . Collision-free accumulators and fail-stop signature schemes without trees[A]. The 16th Annual International Conference on Theory and Application of Cryptographic Techniques[C]. Konstanz,Germany, 1997. 480-494.
|
[14] |
GOODRICH M T , TAMASSIA R , HASIC J . An efficient dynamic and distributed cryptographic accumulator[A]. The 5th International Conference on Information Security[C]. Springer-Verlag London,UK, 2002. 372-388.
|
[15] |
YUM D H , SEO J W , LEE P J . Generalized combinatoric accumulator[J]. IEICE Transactions on Information and Systems, 2008,E91-D(5): 1489-1491.
|
[16] |
CAMENISCH J , KOHLWEISS M , SORIENTE C . An accumulator based on bilinear maps and efficient revocation for anonymous credentials[A]. LNCS 5443[C]. Irvine,CA,United States, 2009. 481-500.
|
[17] |
JAN C , LYSYANSKAYA A . Dynamic accumulators and application to effcient revocation of anonymous credentials[J]. Lecture Notes in Computer Science, 2002,2442: 61-76.
|
[18] |
温涛, 张永, 郭权 等. WSN 中同构模型下动态组密钥管理方案[J]. 通信学报, 2012,33(6):164-173. WEN T , ZHANG Y , GUO Q , et al. Dynamic group key management scheme for homogeneous wireless sensor networks[J]. Journal on Communications, 2012,33(6):164-173.
|
[19] |
KAYALVIZHI R , VIJAYALAKSHMI M , VAIDEHI V . Energy analysis of RSA and ELGAMAL algorithms for wireless sensor networks[J]. Communications in Computer and Information Science, 2010,89: 172-180.
|
[20] |
ARVINDERPAL S , WANDER N G H E . Energy analysis of public-key cryptography for wireless sensor networks[A]. PerCom2005[C]. Kauai Island,HI,United States, 2005. 324-328.
|
[21] |
HAAPOLA J , SHELBY Z , POMALAZA-RáEZ C . Cross-layer energy analysis of multi-hop wireless sensor network[A]. EWSN 2005[C]. Istanbul,Turkey, 2005. 33-44.
|