Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 438-443.
Previous Articles Next Articles
TAN Long and PEI Chao
[1] Ozaki K,Watanabe K,Itaya S,et al.A fault-tolerant model of wireless sensor-actor network[C]∥Proceedings of the Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed computing(ISORC’06).2006:186-193 [2] Castro M,Liskov B.Practical Byzantine Fault Tolerance andProactive Recovery[J].ACM Transactions on Computer Systems(TOCS),2002,20(4):398-461 [3] Coan B.A communication efficient canonical form for fault-tole-rant distributed protocols [C]∥Proc.5th PODC.August 1986:63-72 [4] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003(7):1281-1291 [5] Tseng H C.Sinkhole intrusion indicators in DSR MANETs Cul-pepper[C]∥Proceedings of BroadNets.October 2004:681-688 [6] Heinzelman W.Energy-Efficient Communication Protocol for Wire-less Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci..Jan.2000 [7] Cachin C,kursawe K,Shoup V.Random Oracles in Constantiniple:Practical Asynchronous Byzantine Agreement using Cryptography [J].Journal of Cryptology,18(3):219-246 [8] Lamport,Shostak R,Pease M.The Byzantine generals problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3) [9] Yu H B,Zeng P,Wang Z F.Study of communication protocol ofdistributed sensor network[J].Journal of China Institute of Communications,2004,25(10):102-110 [10] Chan H,Perrig A.ACE:An emergent algorithm for highly uniform cluster formation[C]∥Proc.of the 1st European Workshop on Wireless Sensor Networks.LNCS2920,Berlin:Springer-Verlag,2004:154-171 [11] Eberle H,Gura N,Shantz S C,et al.A Public-Key Cryptogra-phic Processor for RSA and ECC[C]∥15th IEEE International Conference on Application-Specific Systems,Architectures and Processors(ASAP’04).ASAP,2004:98-110 [12] Mohammed E,Emarah A E,El-Shennawy K.Elliptic curvecryptosystems on smart cards[C]∥2001 IEEE 35th International Carnahan Conference on Security Technology.Oct 2001:213-222 [13] Koblitz N.Elliptic Curve Cryptosystems [J].Mathematics ofCompution American Mathematical Society,1987(48):203-309 [14] Johnson D,Menezes A,Vanstone S.The Elliptic Curve Digital Signature Algorithm(ECDSA)[J].International Journal of Information Security,IJIS ,2001(1):36-63 [15] 王潮,时向勇,牛志华.基于Montgomery曲线改进ECDSA算法的研究[J].通信学报,2010,31(1):9-13 [16] Heinzelman W,Chandrakasan A,Balakrishnan H.Energy-Effi-cient Communication Protocol for Wireless Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci.,Jan..2000 [17] Clouqueur T,Saluja K K,Ramanathan P.Fault Tolerance inCollaborative Sensor Networks for Target Detection [J].IEEE Transactions on Computers,2004,53(3):320-333 [18] Handy M J,Haase M,Timmermann D.Low energy adaptiveclustering hierarchy with deterministic cluster-head selection [C]∥Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks.IEEE Communications Society,2002:368-372 [19] 王潮,贾翔宇,林强.基于可信度的无线传感器网络安全路由算法[J].通信学报,2008,29(11):105-112 |
No related articles found! |
|