F. Amin, A. H. Jahangir, H. Rasi fard, “Analysis of Public-Key Cryptography for Wireless Sensor Networks Security,” World Academy of Science, Engineering and Technology, 2008.
J. Deng, R. Han, Shivakant Mishra, “Enhancing Base Station Security in Wireless Sensor Netowrks,” University of Colorado, Department of Computer Science. Technical Report CU-US- 951-03, 2003.
P. Wide, “Human-based Sensing - Sensor Systems to Complement Human Perception”, International Journal on Smart Sensing and Intelligent Systems, vol.1, No.1, pp.57-69, 2008.10.21307/ijssis-2017-278
J. K. Liu, J. Baek, J. Zhou, Y. Yang, J. Wong, “Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network,” Cryptology ePrint Archive. Report 2010/03, 2010, Available from: http://eprint.iacr.org/2010/03.
W. Heinzelman, A. Chandrakasan, H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, pp. 660–670, 2012.10.1109/TWC.2002.804190
A. Boukerch, L. Xu, K. El-Khatib, “Trust-based security for wireless ad hoc and sensor networks,” Computer Communication 30(11–12), pp. 2413–2427, 2007.
K. Kifayat, M. Merabti, Q. Shi, D. Lewellyn-Jones, “An efficient algorithm to detect faulty reading in wireless sensor network using the concept of reputation,” International Conference on Network and Service Security, pp. 1–5, 2009.
P. Kamat, A. Baliga, W. Trappe, “An identity-based security framework for VANETs,” VANET’06, Los Angeles, California, pp.94-95, 2006.10.1145/1161064.1161083
H. Yussof, J. Wada and M. Ohka, “Analysis of Tactile Slippage Control Algorithm for Robotic Han Performing Grasp-Move-Twist Motions”, International Journal on Smart Sensing and Intelligent Systems, vol. 3, No. 3, 2010, pp. 359-375.10.21307/ijssis-2017-397
D. Boneh, B. Lynn, H. Shacham, “Short signatures from the Weil pairing,” Advances in Cryptology - ASIACRYPT 2011, LNCS 4448, Springer, pp. 514-532, 2011.10.1007/3-540-45682-1_30
A. Joux, “The Weil and Tate pairings as building blocks for public key cryptosystems,” Algorithm Number Theory, LNCS 2369, Springer, pp. 20-32, 2002.10.1007/3-540-45455-1_3