메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 10-16

A secure agent architecture for sensor networks

Author keywords

Adaptivity; Digital authenticator; Security; Sensor networks; Tiny active agent

Indexed keywords

ADAPTIVE SYSTEMS; COMPUTER ARCHITECTURE; SECURITY OF DATA; SENSOR DATA FUSION; SYSTEMS ENGINEERING;

EID: 1642399589     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 2
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security (final)
    • DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs), September 1
    • D. Carman, P. Kruus, and B. Matt. Constraints and Approaches for Distributed Sensor Network Security (final), DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs), September 1, 2000
    • (2000)
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 3
    • 84888077711 scopus 로고    scopus 로고
    • Perfectly secure message transmission revisited
    • Lecture Notes in Computer Science 2332, Springer-Verlag
    • Y. Desmedt and Y. Wang, Perfectly secure message transmission revisited. In: Proc. Eurocrypt '02, pages 502-517, Lecture Notes in Computer Science 2332, Springer-Verlag, 2002.
    • (2002) Proc. Eurocrypt '02 , pp. 502-517
    • Desmedt, Y.1    Wang, Y.2
  • 4
    • 0242603236 scopus 로고    scopus 로고
    • An object-oriented framework for security policy representation
    • Master's thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, December
    • Tim Fraser. An object-oriented framework for security policy representation. Master's thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, December 1996.
    • (1996)
    • Fraser, T.1
  • 6
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication. Communication of the ACM, 24(11):770-772, 1981.
    • (1981) Communication of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 8
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. Needham, and M. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 13
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • R. S. Sandhu and E. J. Coyne. Role-based access control models. IEEE Computer, 29(2), February 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2
    • Sandhu, R.S.1    Coyne, E.J.2
  • 14
    • 0039768535 scopus 로고    scopus 로고
    • Models for dependable computation with multiple inputs and some hardness results
    • Y. Wang, Y. Desmedt, and M. Burmester. Models for dependable computation with multiple inputs and some hardness results. Fundamenta Informaticae, 42(1):61-73, 2000.
    • (2000) Fundamenta Informaticae , vol.42 , Issue.1 , pp. 61-73
    • Wang, Y.1    Desmedt, Y.2    Burmester, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.