메뉴 건너뛰기




Volumn 24, Issue , 2004, Pages 796-802

Scalable cryptographic key management in wireless sensor networks

Author keywords

Autonomous Computing; Combinatorial Optimization; Large scale Sensor Networks; Virtual Communication Infrastructure

Indexed keywords

COMBINATORIAL MATHEMATICS; COMPUTATIONAL METHODS; CRYPTOGRAPHY; ENERGY UTILIZATION; NETWORK PROTOCOLS; OPTIMIZATION; PARAMETER ESTIMATION; SENSORS; TELECOMMUNICATION LINKS; VISUAL COMMUNICATION;

EID: 3042592224     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdcsw.2004.1284124     Document Type: Conference Paper
Times cited : (27)

References (16)
  • 2
    • 0035121216 scopus 로고    scopus 로고
    • SmartDust: Communicating with a cubic-millimeter computer
    • January
    • Warneke, M. Last, B. Leibowitz, and K. Pister, SmartDust: communicating with a cubic-millimeter computer, IEEE Computer, vol. 34, no. 1, January 2001.
    • (2001) IEEE Computer , vol.34 , Issue.1
    • Warneke1    Last, M.2    Leibowitz, B.3    Pister, K.4
  • 5
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor networks security
    • Sep.
    • D. Carman, P. Kruus, and B. Matt, "Constraints and Approaches for Distributed Sensor Networks Security," NAI Technical Report #00-010, Sep. 2000.
    • (2000) NAI Technical Report #00-010 , Issue.10
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 6
    • 84862378723 scopus 로고    scopus 로고
    • TinySec http://www.cs.berkeley.edu/~nks/tinysec/
  • 8
    • 3042546486 scopus 로고    scopus 로고
    • A hierarchical key management method for low-energy wireless sensor networks
    • Nov.
    • G. Jolly, M. Kuşçu, and P. Kokate, "A Hierarchical Key Management Method for Low-Energy Wireless Sensor Networks", UMBC Online Document, Nov. 2002.
    • (2002) UMBC Online Document
    • Jolly, G.1    Kuşçu, M.2    Kokate, P.3
  • 11
    • 0032627571 scopus 로고    scopus 로고
    • Key management for secure internet multicast using boolean function minimization techniques
    • IEEE, March
    • I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques", Proceedings of Infocom'99, IEEE, March 1999.
    • (1999) Proceedings of Infocom'99
    • Chang, I.1    Engel, R.2    Kandlur, D.3    Pendarakis, D.4    Saha, D.5
  • 12
    • 24544476022 scopus 로고    scopus 로고
    • Whisper: Local secret maintenance in sensor networks
    • the Ohio State University, January
    • V. Naik, S. Bapat, A. Arora, and M. Gouda. Whisper: Local secret maintenance in sensor networks. Technical Report OSU-CISRC-1/03-TR04, The Ohio State University, January 2003.
    • (2003) Technical Report , vol.OSU-CISRC-1-03-TR04
    • Naik, V.1    Bapat, S.2    Arora, A.3    Gouda, M.4
  • 14
    • 84862382455 scopus 로고    scopus 로고
    • http://www.es.odu.edu/~wadaa/code/ithKsubset/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.