메뉴 건너뛰기




Volumn 60, Issue 2, 2004, Pages 1228-1232

VP3: Using vertex path and power proximity for energy efficient key distribution

Author keywords

[No Author keywords available]

Indexed keywords

PHYSICAL LAYERS; POWER PROXIMITY; SYMMETRIC KEYS; VERTEX PATH;

EID: 17144418536     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (10)
  • 1
    • 4143085056 scopus 로고    scopus 로고
    • Cross-layer design for energy-efficient secure multicast communications in ad hoc networks
    • Paris, France, May
    • L. Lazos and R. Poovendran, Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks, In Proc. of IEEE ICC 2004, Paris, France, May 2004.
    • (2004) Proc. of IEEE ICC 2004
    • Lazos, L.1    Poovendran, R.2
  • 2
    • 0033894011 scopus 로고    scopus 로고
    • On the construction of energy efficient broadcast and multicast trees in wireless networks
    • March
    • J.E. Wieselthier, G.D. Nguyen and A. Ephremides, On the Construction of Energy Efficient Broadcast and Multicast Trees in Wireless Networks, In Proc. of INFOCOM 2000, March 2000.
    • (2000) Proc. of INFOCOM 2000
    • Wieselthier, J.E.1    Nguyen, G.D.2    Ephremides, A.3
  • 3
    • 4143117199 scopus 로고    scopus 로고
    • Secure broadcast in energy-aware wireless sensor networks
    • Victoria, Sep.
    • L. Lazos and R. Poovendran, Secure Broadcast in Energy-Aware Wireless Sensor Networks, in Proc. of IEEE ISWC 2002, Victoria, Sep. 2002.
    • (2002) Proc. of IEEE ISWC 2002
    • Lazos, L.1    Poovendran, R.2
  • 4
    • 0141787007 scopus 로고    scopus 로고
    • Energy-aware secure multicast communication in ad-hoc networks using geographic location information
    • April, Hong Kong, China
    • L. Lazos and R. Poovendran, Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information, In Proc of IEEE ICASSP 2003, April 2003, Hong Kong, China.
    • (2003) Proc of IEEE ICASSP 2003
    • Lazos, L.1    Poovendran, R.2
  • 5
    • 0003657439 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • Sep.
    • D.M. Wallner, E.C. Harder and R.C. Agee, Key Management for Multicast: Issues and Architectures, INTERNET DRAFT, Sep. 1998.
    • (1998) Internet Draft
    • Wallner, D.M.1    Harder, E.C.2    Agee, R.C.3
  • 6
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb.
    • C.K. Wong, M. Gouda and S. Lam, Secure Group Communications Using Key Graphs, In IEEE/ACM Transactions on Networking, Feb. 2000 vol. 8, no.1, pp. 16-31.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-31
    • Wong, C.K.1    Gouda, M.2    Lam, S.3
  • 7
    • 0006513010 scopus 로고    scopus 로고
    • Reliable group rekeying: Design and performance analysis
    • August
    • Y. Yang, X. Li and S. Lam, Reliable Group Rekeying: Design and Performance Analysis, In Proc. of SIGCOMM 2001, August 2001.
    • (2001) Proc. of SIGCOMM 2001
    • Yang, Y.1    Li, X.2    Lam, S.3
  • 8
    • 1642313744 scopus 로고    scopus 로고
    • Metrics useful in network tomography studies
    • March
    • Y. Vardi, Metrics Useful in Network Tomography Studies, In IEEE Signal Processing Letters, Vol 11, Num. 3, pp. 353-355, March 2004.
    • (2004) IEEE Signal Processing Letters , vol.11 , Issue.3 , pp. 353-355
    • Vardi, Y.1
  • 10
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • April
    • F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, IN Proc. of SPW 1999, April 1999.
    • (1999) Proc. of SPW 1999
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.