Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,†in Proc. IEEE Symp. SP, May 2003, pp. 197–213. [2] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A key predistribution scheme for sensor networks using deployment knowledge,†IEEE Trans. Dependable Secure Comput., vol. 3, no. 1, pp. 62–77, Jan./Mar. 2006. [3] W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,†ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005. [4] M. Rahman and K. El-Khatib, “Private key agreement and secure communication for heterogeneous sensor networks,†J. Parallel Distrib. Comput., vol. 70, no. 8, pp. 858–870, 2010. [5] M. R. Alagheband and M. R. Aref, “Dynamic and secure key management model for hierarchical heterogeneous sensor networks,†IET Inf. Secur., vol. 6, no. 4, pp. 271–280, Dec. 2012. [6] D. S. Sanchez and H. Baldus, “A deterministic pairwise key predistribution scheme for mobile sensor networks,†in Proc. 1st Int. Conf. SecureComm, Sep. 2005, pp. 277–288. [7] I.-H. Chuang, W.-T. Su, C.-Y. Wu, J.-P. Hsu, and Y.-H. Kuo, “Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks,†in Proc. IEEE WCNC, Mar. 2007, pp. 4145–4150. [8] S. Agrawal, R. Roman, M. L. Das, A. Mathuria, and J. Lopez, “A novel key update protocol in mobile sensor networks,†in Proc. 8th Int. Conf. ICISS, vol. 7671. 2012, pp. 194–207. [9] S. U. Khan, C. Pastrone, L. Lavagno, and M. A. Spirito, “An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks,†in Proc. 6th Int. Conf. CRiSIS, Sep. 2011, pp. 1–8. [10] X. Zhang, J. He, and Q. Wei, “EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks,†EURASIP J. Wireless Commun. Netw., vol. 2011, pp. 1–11, Jan. 2011. [11] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,†in Proc. 6th Int. Workshop Cryptograph. Hardw. Embedded Syst., 2004, pp. 119–132. [12] S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,†in Proc. 9th Int. Conf. ASIACRYPT, vol. 2894. 2013, pp. 452–473. [13] S. Seo and E. Bertino, “Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing,†CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 2013-10, 2013. [Online]. Available: https://www.cerias.purdue.edu/apps/reports_and_papers/.Seung-Hyun [14] S. H. Seo, J. Won, and E. Bertino, “POSTER: A pairing-free certificateless hybrid sign cryption scheme for advanced metering infrastructures,†in Proc. 4th ACM CODASPY, 2014, pp. 143–146. [15] Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, “Fast authenticated key establishment protocols for self-organizing sensor networks,†in Proc. 2nd ACM Int. Conf. WSNA, 2003, pp. 141–150. [16] J.David Sukeerthi Kumar,†Investigation on Secondary Memory Management in Wireless Sensor Network,†International Journal of Computer Engineering In Research Trends.,vol .2,no.6,pp.387-391,June 2015. [17] Kuruva Laxmanna, N.Poorna Chandra Rao, Dr.S.Prem Kumar,†Moderating vampire attacks in Wireless Sensor Network,†International Journal of Computer Engineering In Research Trends.,vol.1,no.3,pp.143-151,September 2014. [18].P.G.V.SureshKumar,Seelam Sowjanya,â€Developing an Enterpriseenvironment By Using Wireless Sensor Network System Architecture,†International Journal of Computer Engineering In Research Trends.,vol .2,no.10,pp.902-908,October 2015. [19] Dr. C. Gulzar,AmeenaYasmeen," Maximum network lifetime with load balance and connectivity by clustering process for wireless sensor networks,â€International Journal of Computer Engineering In Research Trends.,vol.3,no.7,pp.375-383,July 2016. [20] A.Yogananda ,Chepuri Sai Teja ," A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments, †International Journal of Computer Engineering In Research Trends.,vol.3,no.8,pp.436-440,August 2016.
![]() | V4I7005.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|