메뉴 건너뛰기




Volumn , Issue , 2003, Pages 197-213

Random key predistribution schemes for sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; RESOURCE ALLOCATION; SECURITY OF DATA; SENSORS;

EID: 0038487088     PISSN: 10637109     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1774)

References (25)
  • 2
    • 0038650640 scopus 로고    scopus 로고
    • Key infection: Smart trust for smart dust
    • Unpublished Manuscript, November
    • Ross Anderson and Adrian Perrig. Key infection: Smart trust for smart dust. Unpublished Manuscript, November 2001.
    • (2001)
    • Anderson, R.1    Perrig, A.2
  • 4
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • May
    • M. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters, 29(11):999-1001, May 1993.
    • (1993) Electronics Letters , vol.29 , Issue.11 , pp. 999-1001
    • Beller, M.1    Yacobi, Y.2
  • 5
    • 0035476075 scopus 로고    scopus 로고
    • Making home automation communications secure
    • Oct
    • Peter Bergstrom, Kevin Driscoll, and John Kimball. Making home automation communications secure. IEEE Computer, 34(10):50-56, Oct 2001.
    • (2001) IEEE Computer , vol.34 , Issue.10 , pp. 50-56
    • Bergstrom, P.1    Driscoll, K.2    Kimball, J.3
  • 8
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs Technical Report #00-010, September
    • David W. Carman, Peter S. Kruus, and Brian J. Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000.
    • (2000)
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 9
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , Issue.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 16
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • R. Merkle. Secure communication over insecure channels. Communications of the ACM, 21(4):294-299, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 18
    • 84969354234 scopus 로고
    • On key distribution and authentication in mobile radio networks
    • Lecture Notes in Computer Science
    • C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii. On key distribution and authentication in mobile radio networks. In Advances in Cryptology - EuroCrypt '93, pages 461-465, 1993. Lecture Notes in Computer Science Volume 765.
    • (1993) Advances in Cryptology - EuroCrypt '93 , vol.765 , pp. 461-465
    • Park, C.1    Kurosawa, K.2    Okamoto, T.3    Tsujii, S.4
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 23
    • 84969340391 scopus 로고
    • Key distribution protocol for digital mobile communication systems
    • Lecture Notes in Computer Science
    • M. Tatebayashi, N. Matsuzaki, and D. B. Jr. Newman. Key distribution protocol for digital mobile communication systems. In Advances in Cryptology - Crypto '89, pages 324-334, 1989. Lecture Notes in Computer Science Volume 435.
    • (1989) Advances in Cryptology - Crypto '89 , vol.435 , pp. 324-334
    • Tatebayashi, M.1    Matsuzaki, N.2    Newman D.B., Jr.3
  • 24
    • 2642534140 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • Duncan S. Wong and Agnes H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - ASIACRYPT '2001, 2001.
    • (2001) Advances in Cryptology - ASIACRYPT '2001
    • Wong, D.S.1    Chan, A.H.2
  • 25
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6):24-30, November/December 1969.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.