메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 197-213

Random key predistribution schemes for sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; SENSOR NETWORKS;

EID: 28444433009     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199337     Document Type: Conference Paper
Times cited : (785)

References (25)
  • 4
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • May
    • M. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters, 29(11):999-1001,May 1993.
    • (1993) Electronics Letters , vol.29 , Issue.11 , pp. 999-1001
    • Beller, M.1    Yacobi, Y.2
  • 5
    • 0035476075 scopus 로고    scopus 로고
    • Making home automation communications secure
    • Oct
    • Peter Bergstrom, Kevin Driscoll, and John Kimball. Making home automation communications secure. IEEE Computer, 34(10):50-56, Oct 2001.
    • (2001) IEEE Computer , vol.34 , Issue.10 , pp. 50-56
    • Bergstrom, P.1    Driscoll, K.2    Kimball, J.3
  • 8
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • September
    • David W. Carman, Peter S. Kruus, and Brian J. Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000.
    • (2000) NAI Labs Technical Report
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 9
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 11
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Advances in Cryptology - CRYPTO '93
    • Amos Fiat and Moni Naor. Broadcast encryption. In Advances in Cryptology - CRYPTO '93, volume 773 of Lecture Notes in Computer Science, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773
    • Fiat, A.1    Naor, M.2
  • 13
    • 0001617669 scopus 로고
    • Reducing memory and traffic requirements for scalable directory-based cache coherence schemes
    • Architecture
    • Anoop Gupta, Wolf-Dietrich Weber, and Todd Mowry. Reducing memory and traffic requirements for scalable directory-based cache coherence schemes. In Proceedings of the 1990 International Conference on Parallel Processing (Vol. I Architecture), pages 312-321, 1990.
    • (1990) Proceedings of the 1990 International Conference on Parallel Processing , vol.1 , pp. 312-321
    • Gupta, A.1    Weber, W.-D.2    Mowry, T.3
  • 16
    • 0017959977 scopus 로고
    • Secure communication over insecure channels
    • R. Merkle. Secure communication over insecure channels. Communications of the ACM, 21(4):294-299, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 18
    • 84969354234 scopus 로고
    • On key distribution and authentication in mobile radio networks
    • Advances in Cryptology - EuroCrypt '93
    • C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii. On key distribution and authentication in mobile radio networks. In Advances in Cryptology - EuroCrypt '93, pages 461-465, 1993. Lecture Notes in Computer Science Volume 765.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 461-465
    • Park, C.1    Kurosawa, K.2    Okamoto, T.3    Tsujii, S.4
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 21
    • 14844287958 scopus 로고    scopus 로고
    • The Strange Logic of Random Graphs
    • J. Spencer. The Strange Logic of Random Graphs. Number 22 in Algorithms and Combinatorics. 2000.
    • (2000) Algorithms and Combinatorics , Issue.22
    • Spencer, J.1
  • 23
    • 84969340391 scopus 로고
    • Key distribution protocol for digital mobile communication systems
    • Advances in Cryptology - Crypto '89
    • M. Tatebayashi, N. Matsuzaki, and D. B. Jr. Newman. Key distribution protocol for digital mobile communication systems. In Advances in Cryptology - Crypto '89, pages 324-334, 1989. Lecture Notes in Computer Science Volume 435.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 324-334
    • Tatebayashi, M.1    Matsuzaki, N.2    Newman, D.B.3
  • 24
    • 2642534140 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • Duncan S. Wong and Agnes H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - ASIACRYPT '2001, 2001.
    • (2001) Advances in Cryptology - ASIACRYPT '2001
    • Wong, D.S.1    Chan, A.H.2
  • 25
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6):24-30, November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.