메뉴 건너뛰기




Volumn 2, Issue 3, 2005, Pages 233-247

On the distribution and revocation of cryptographic keys in sensor networks

Author keywords

Distributed algorithms; Key distribution; Key management; Revocation; Security; Sensor networks

Indexed keywords

COMPUTER NETWORKS; ELECTRIC NETWORK TOPOLOGY; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SECURITY SYSTEMS; SENSORS;

EID: 27644488112     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2005.37     Document Type: Article
Times cited : (149)

References (21)
  • 6
    • 27644517087 scopus 로고    scopus 로고
    • Key distribution techniques for sensor networks
    • T. Znati et al., eds.
    • H. Chan, A. Perrig, and D. Song, "Key Distribution Techniques for Sensor Networks," Wireless Sensor Networks, T. Znati et al., eds., 2004.
    • (2004) Wireless Sensor Networks
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 8
    • 0003237987 scopus 로고
    • The kerberos network authentication service (V5)
    • Sept. ftp://ftp.math.utah.edu/pub/rfc/rfc1510.txt.
    • J. Kohl and C. Neuman, "The Kerberos Network Authentication Service (V5)," RFC 1510, Sept. 1993, ftp://ftp.internic.net/rfc/rfc1510.txt, ftp://ftp.math.utah.edu/pub/rfc/rfc1510.txt.
    • (1993) RFC , vol.1510
    • Kohl, J.1    Neuman, C.2
  • 10
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Advances in Cryptology: Proc. Eurocrypt '84, pp. 335-338, 1984.
    • (1984) Advances in Cryptology: Proc. Eurocrypt '84 , pp. 335-338
    • Blom, R.1
  • 13
    • 80052567846 scopus 로고    scopus 로고
    • Deterministic key predistribution schemes for distributed sensor networks
    • J. Lee and D. Stinson, "Deterministic Key Predistribution Schemes for Distributed Sensor Networks," Selected Areas in Cryptography, 2004.
    • (2004) Selected Areas in Cryptography
    • Lee, J.1    Stinson, D.2
  • 16
    • 8344253818 scopus 로고    scopus 로고
    • Aug.
    • C.S. Laboratory, "Secure Hash Standard," pp. 180-182, Aug. 2002.
    • (2002) Secure Hash Standard , pp. 180-182
  • 17
    • 0010227321 scopus 로고    scopus 로고
    • Fast encryption and authentication: XCBC encryption and XECB authentication modes
    • M. Matsui ed., Apr.
    • V. Gligor and P. Donescu, "Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes," Fast Software Encryption (FSE), M. Matsui ed., Apr. 2001.
    • (2001) Fast Software Encryption (FSE)
    • Gligor, V.1    Donescu, P.2
  • 18
    • 0004103610 scopus 로고    scopus 로고
    • Encryption modes with almost free message integrity
    • May
    • C. Jutla, "Encryption Modes with Almost Free Message Integrity," Proc. Advances in Cryptology-EUROCRYPT 2001, pp. 525-542, May 2001.
    • (2001) Proc. Advances in Cryptology-EUROCRYPT 2001 , pp. 525-542
    • Jutla, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.