메뉴 건너뛰기




Volumn , Issue , 2003, Pages 52-61

Establishing pairwise keys in distributed sensor networks

Author keywords

Key management; Probabilistic key sharing; Sensor networks

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; PROBABILITY DISTRIBUTIONS; QUALITY OF SERVICE; SECURITY SYSTEMS; SENSORS;

EID: 3042822764     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948117.948119     Document Type: Conference Paper
Times cited : (1125)

References (16)
  • 2
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • Advances in Cryptology - CRYPTO '92
    • C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology - CRYPTO '92, LNCS 740, pages 471-486, 1993.
    • (1993) LNCS , vol.740 , pp. 471-486
    • Blundo, C.1    De Santis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 3
    • 4544365398 scopus 로고    scopus 로고
    • Constrains and approaches for distributed sensor network security
    • NAI Labs
    • D.W. Carman, P.S. Kruus, and B.J.Matt. Constrains and approaches for distributed sensor network security. Technical report, NAI Labs, 2000.
    • (2000) Technical Report
    • Carman, D.W.1    Kruus, P.S.2    Matt, B.J.3
  • 6
    • 0022793132 scopus 로고
    • How to construct random functions
    • October
    • O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. of the ACM, 33(4):792-807, October 1986.
    • (1986) J. of the ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 8
    • 0006740356 scopus 로고    scopus 로고
    • Seminumerical algorithms
    • Addison-Wesley, third edition, ISBN: 0-201-89684-2
    • D.E. Knuth. The Art of Computer Programming, volume Vol. 2: Seminumerical Algorithms. Addison-Wesley, third edition, 1997. ISBN: 0-201-89684-2.
    • (1997) The Art of Computer Programming , vol.2
    • Knuth, D.E.1
  • 9
    • 85180532806 scopus 로고    scopus 로고
    • Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
    • February
    • D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proc. of the 10th Annual Network and Distributed System Security Symposium, pages 263-276, February 2003.
    • (2003) Proc. of the 10th Annual Network and Distributed System Security Symposium , pp. 263-276
    • Liu, D.1    Ning, P.2
  • 15
    • 2642534140 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • December
    • D. Wong and A. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Proc. ASIACRYPT 2001., December 2001.
    • (2001) Proc. ASIACRYPT 2001
    • Wong, D.1    Chan, A.2
  • 16
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62 October 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.