메뉴 건너뛰기




Volumn 9, Issue 11, 2005, Pages 970-972

Analysis and improvement of an authenticated key exchange protocol for sensor networks

Author keywords

Authentication; Key Establishment Protocol; Secure sensor networks

Indexed keywords

DATA PRIVACY; NETWORK PROTOCOLS; PROBABILITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 28244469017     PISSN: 10897798     EISSN: None     Source Type: Journal    
DOI: 10.1109/LCOMM.2005.11006     Document Type: Article
Times cited : (53)

References (9)
  • 2
    • 85016462400 scopus 로고
    • "Systematic design of two-party authentication protocols"
    • Springer, Lecture Notes in Computer Science No. 576
    • R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung, "Systematic design of two-party authentication protocols," in Proc. CRYPTO 91. Springer, 1992, pp. 44-61, Lecture Notes in Computer Science No. 576.
    • (1992) Proc. CRYPTO 91 , pp. 44-61
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutten, S.5    Molva, R.6    Yung, M.7
  • 7
    • 28244445001 scopus 로고    scopus 로고
    • Mandatory ECC Security algorithm suite Submissions to IEEE P802.15 Wireless Personal Area Networks, Mar.
    • R. Struik and G. Rasor, Mandatory ECC Security algorithm suite, Submissions to IEEE P802.15 Wireless Personal Area Networks, Mar. 2002.
    • (2002)
    • Struik, R.1    Rasor, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.