Survey on group authentication in wireless sensor networks, 2015 International Conference on Pervasive Computing (ICPC), 2015. ,
DOI : 10.1109/PERVASIVE.2015.7087199
The Art of Wireless Sensor Networks, 2013. ,
Hierarchical Group Key Management using Threshold Cryptography in Wireless Sensor Networks, International Journal of Computer Applications, vol.63, issue.4, 2013. ,
DOI : 10.5120/10457-5166
Powertrace: Networklevel Power Profiling for Low-power Wireless Networks, pp.5-1100, 2011. ,
Applicability of multiparty computation schemes for wireless sensor networks, Proceedings of the Data Communication Networking, 2010. ,
Secure Monitoring Scheme Based on Identity-Based Threshold Signcryption for Wireless Sensor Networks, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. ,
DOI : 10.1109/WiCom.2008.892
An elliptic threshold signature framework for k-security in wireless sensor networks, 2008 15th IEEE International Conference on Electronics, Circuits and Systems, 2008. ,
DOI : 10.1109/ICECS.2008.4674832
MMµTESLA: broadcast authentication protocol for multiple-base-station sensor networks, Chinese Journal of Computers, 2007. ,
Looking Around First: Localized Potential-Based Clustering in Spontaneous Networks, IEEE Communications Letters, vol.11, issue.8, 2007. ,
DOI : 10.1109/LCOMM.2007.07466
URL : https://hal.archives-ouvertes.fr/hal-01151827
Security Framework for Wireless Sensor Networks, Wireless Personal Communications, vol.38, issue.5, 2006. ,
DOI : 10.1007/s11277-006-9044-7
Contiki - a lightweight and flexible operating system for tiny networked sensors, 29th Annual IEEE International Conference on Local Computer Networks, 2004. ,
DOI : 10.1109/LCN.2004.38
SPINS, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2002. ,
DOI : 10.1145/381677.381696
CupCarbon: A Multi-Agent and Discrete Event Wireless Sensor Network Design and Simulation Tool, Proceedings of the Seventh International Conference on Simulation Tools and Techniques, 2014. ,
DOI : 10.4108/icst.simutools.2014.254811
URL : https://hal.archives-ouvertes.fr/hal-00963926
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, Third IEEE International Conference on Pervasive Computing and Communications, p.324328, 2005. ,
DOI : 10.1109/PERCOM.2005.18