|
[AUMA09] J.P. Aumasson, W. Meier, and F. Mendel, “Preimage attacks on 3-Pass HAVAL and step-reduced MD5,” in Proc. Of the 15th Workshop on Selected Areas in Cryptography, pp. 120-135, 2009. [BECH13] W. Bechkit, Y.Challal, and A. Bouabdallah, “A new class of hash-chain based key pre-distribution scheme for WSN,” Computer Communications, Vol. 36, pp. 243-255, 2013 [CHAN03]H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. Secur. Privacy (SP), pp. 197- 213, 2003. [CHEI16] O. Cheikhrouhou, “Secure group communication in wireless sensor net- works: a survey,” Journal of Network and Computer Applications, pp. 115-132, 2016. [CAST17] A. Castiglion, P. D’Arco, A.D. Santis, R. Russo, “Secure group communication scheme for dynamic heterogeneous distributed computing,” Future Generation Computer System, pp. 313-324, 2017 [CHEN17] Y.R. Chen and W.G. Tzeng, “Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members,” Computer Communications, Vol. 98, pp. 31-42, 2017.. [DINI15] G. Dini and L. Lopriore, “Distributed storage protection in wireless sensor networks,” Journal of System Architecture, Vol. 61 pp. 256-266, 2015. [GAND17] F. Gandino, R. Ferrero, and M. Rebaudengo, “A key distribution scheme for mobile wireless sensor networks: q-s-Composite,” IEEE Transaction on Information Forensics and Security, Vol. 12, pp. 34-47 2017 [HU05] Y.C. Hu, M. Jakobsson, and A. Perrig, “Efficient constructions for one- way hash chains,” in Proc. Of 3rd international conf. on Applied Cryptography and Network Security, pp.423-441, 2005. [HARN15] L. Harn and C.F. Hsu, “Predistribution scheme for establishing group keys in Wireless sensor networks,” IEEE Sensor Journal, Vol. 15, pp. 5103- 5108, 2015. [KHAN12] E. Khan, E. Gabidulin, B. Honary, and H. Ahmed, “Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wire- less sensor network,” IET Wireless Sensor Syst., Vol.2, pp.708-114 2012. [KLON17] M. Klonowski, P. Syga, “Enhancing privacy for ad hoc systems with pre- deployment key distribution,” Ad Hoc Networks, pp. 35-47, 2017. [LIN10] Y.Y. LIN, R.Z. Wang. Scalable secret image sharing with smaller shadow images. IEEE Signal Process Lett 2010;17(3):316–19. [LIN07] S.J Lin, J.C Lin. VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognit 2007;40(12):3652–66. [LI13] P Li, C.N Yang, C.C Wang, Q. Kong, Ma Y. Essential secret image sharing scheme with different importance of shadows. J Vis Commun Image Represent 2013;24(7):1106–14. [LEVI17] A. Levi, S. Sarimurat, “Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensor in IOT context,” Ad Hoc Net- works, pp. 3-8, 2017. [LI13] F. Li and P. Xiong. “Practical secure communication for integrating wire- less sensor networks into Internet of Things,” IEEE Sensor J. , Vol. 13, pp. 3677-3684, 2013. [LOUW17] J. Louw, G. Nienzen, T.D. Ramotsoela, A.M. Abu-Mahfouz, “A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks,” 2016 IEEE 14th International Conference on Industrial Infor- mation(INDIN) pp. 1166-1170, 2017. [MAGA14] A.A. Magar, “A Survey about Key Pre-distribution Scheme in Wireless Sensor Networks,” International Journal of Engineering Research and General Science, Vol2, pp.423-429, 2014. [MESS14] M.L. Messai, H. Seba, “A survey of key management schemes in multi- phase wireless sensor networks,” Computer Networks, pp. 60-74, 2016. [MEHM17] A. Mehmood, M. M. Umar, and H. Song, “ICMDS: Secure inter-cluster multiple –key distribution scheme for wireless sensor networks,” Ad Hoc Networks, vol. 55, pp. 97-106, 2017 [RASH11] A. Rasheed and R.N. Mahapatra, “Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks,” IEEE Trans. Parallel Distrib. Syst., Vol. 22, pp. pp. 176-184, 2011. [SARA17] R.V. Saraswathi, L.P. Sree, K. Anuradha, “Dynamic and probabilistic key management for distributed wireless sensor networks,”.2016 IEEE Inter- national Conference on Computational Intelligence and Computing Re- search (ICCIC), 2017. [YANG07] C. Yang, T. Chen, K. Yu, C. Wang. Improvements of image sharing with steganography and authentication. Journal of Systems and Software 2007;80(7):1070–6. ISSN 0164-1212 [YANG10] C.N. Yang, C.B. Ciou. Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 2010;28(12):1600–10. [YANG11] C.N. Yang, Y.Y. Chou. A general scalable secret image sharing scheme with the smooth scalability. J Syst Softw 2011;84(10):1726–33. [YANG12] C.N. Yang,J.F. Ouyang, L. Harn. Steganography and authentication in image sharing without parity bits. Opt Commun 2012;285(7):1725–35. [YAVU15] F. Yavuz, J. Zhao, O. Yağan, and V. Gilgor, “Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme,” 2015 IEEE International Conference on Communications (ICC), pp.6277-6283, 2015 [YAGA16] O. Yagan, A.M. Makowski, “Wireless sensor networks under the random pairwise key predistribution scheme can resiliency be achieved with small key rings,” IEEE/ACM transaction on networking, Vol. 24, pp.3383-3396, 2016. [YANG17] C.N. Yang, J.M. Li, and Y.S. Chou, “On the analysis of k-secure t-conference key distribution scheme,” ICCNS 2017 Proceedings of the 2017 the 7th International Conference on Communication and Network Security, pp.91-95 2017. [YEIN17] A.D. Yein, C.H. Lin, W.S. Hsieh, “A secure mutual trust scheme for wire- less sensor networks,” 2017 IEEE 26th International Symposium on Indus- trial Electronics (ISIE), pp. 1369-1375, 2017. [YAN19] X. Yan, L. Liu, Y. Lu, Q. Gong Security analysis and classification of image secret sharing. J Inf Secur Appl 2019; 47:208–16. [ZHAO09] R. Zhao, J. Zhao, F. Dai, F. Zhao. A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 2009;31(1):252–7. ISSN 0920-5489 [ZHAO14] J. Zhao, O. Yagan, V. Gligor, “On topological properties of wireless sensor networks under q-composite key pre-distribution scheme with on/off channels,” 2014 IEEE International Symposium on Information Theory, pp.1131-1135, 2014. [ZHAO17] J. Zhao, “Topological properties of secure wireless sensor networks under q-composite key pre-distribution scheme with unreliable links,” IEEE/ACM transactions on networking, Vol. 25, pp. 3383-3396, 2016. [ZHAN17] F. Zhan, N. Yao, Z. Gao, G. Tan, “A novel key generation method for wire- less sensor networks based on system of equations,” Journal of Network and Computer Applications, pp. 114-127, 2017.
|