메뉴 건너뛰기




Volumn , Issue , 2005, Pages 88-95

ANSWER: Autonomous wireless sensor network

Author keywords

Anonymity; Autonomous sensor networks; Wireless security

Indexed keywords

ANONYMITY; AUTONOMOUS SENSOR NETWORKS; WIRELESS SECURITY;

EID: 32144464402     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1089761.1089776     Document Type: Conference Paper
Times cited : (15)

References (52)
  • 7
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, A. and Stajano, F. Location privacy in pervasive computing, Pervasive Computing, 2, 1 (2003), 46-55.
    • (2003) Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 13
    • 12444324513 scopus 로고    scopus 로고
    • Providing secrecy in key management protocols for large wireless sensor networks
    • DiPietro, R., Mancini, L. V. and Jajodia, S. Providing secrecy in key management protocols for large wireless sensor networks, Journal of AdHoc Networks, 1, 4 (2003), 455-468.
    • (2003) Journal of AdHoc Networks , vol.1 , Issue.4 , pp. 455-468
    • Dipietro, R.1    Mancini, L.V.2    Jajodia, S.3
  • 24
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level μTESLA: A broadcast authentication system for distributed sensor networks
    • Liu, D. and Ning, P. Multi-level μTESLA: A broadcast authentication system for distributed sensor networks, ACM Transactions in Embedded Computing Systems (2004).
    • (2004) ACM Transactions in Embedded Computing Systems
    • Liu, D.1    Ning, P.2
  • 26
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • Molva, R., Samfat, D. and Tsudik, G. Authentication of mobile users, IEEE Network, 8, 2 (1994), 26-34.
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 28
    • 4444346335 scopus 로고    scopus 로고
    • Wireless sensor networks: Leveraging the virtual infrastructure
    • Olariu, S., Wadaa, A., Wilson, L. and Eltoweissy, M. Wireless sensor networks: leveraging the virtual infrastructure, IEEE Network, 18, 4 (2004), 51-56.
    • (2004) IEEE Network , vol.18 , Issue.4 , pp. 51-56
    • Olariu, S.1    Wadaa, A.2    Wilson, L.3    Eltoweissy, M.4
  • 29
    • 33646713379 scopus 로고    scopus 로고
    • Simple self-organization protocol for massively deployed sensor networks
    • to appear
    • Olariu, S. and Xu, Q. A simple self-organization protocol for massively deployed sensor networks, Computer Communications, (2005) to appear.
    • (2005) Computer Communications
    • Olariu, S.1    Xu, Q.A.2
  • 31
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • Perrig, A., Canetti, R., Tygar, D. and Song, D. The TESLA broadcast authentication protocol, RSA CryptoBytes, 5, 2 (2002), 2-13.
    • (2002) RSA CryptoBytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 40
  • 41
    • 10944236901 scopus 로고    scopus 로고
    • Methods for scalable self-assembly of ad hoc wireless sensor networks
    • Sohrabi, K., et al, Methods for scalable self-assembly of ad hoc wireless sensor networks, IEEE Transactions on Mobile Computing, 3, 4 (2004), 317-331.
    • (2004) IEEE Transactions on Mobile Computing , vol.3 , Issue.4 , pp. 317-331
    • Sohrabi, K.1
  • 44
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood, A. D. and Stankovic, J. A. Denial of service in sensor networks, IEEE Computer, 35, 4 (2002), 54-62.
    • (2002) IEEE Computer , vol.35 , Issue.4 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 45
    • 84861599421 scopus 로고    scopus 로고
    • Differentiated surveillance for sensor networks
    • Los Angeles, California, November
    • Van, T., He, T. and Stankovic, J. A. Differentiated surveillance for sensor networks, In Proceedings of the ACM SenSys, (Los Angeles, California, November 2003).
    • (2003) Proceedings of the ACM SenSys
    • Van, T.1    He, T.2    Stankovic, J.A.3
  • 48
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • March
    • Ye, F., Luo, H., Lu, S. and Zhang, L. Statistical en-route filtering of injected false data in sensor networks, In Proceedings of the IEEE INFOCOM (March 2004).
    • (2004) Proceedings of the IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 49
    • 0343898172 scopus 로고    scopus 로고
    • New frontiers: Selfassembly and nano-electronics
    • Zhimov, V. V. and Herr, D. J. C. New frontiers: selfassembly and nano-electronics, IEEE Computer, 34, 1 (2001), 34-43.
    • (2001) IEEE Computer , vol.34 , Issue.1 , pp. 34-43
    • Zhimov, V.V.1    Herr, D.J.C.2
  • 50
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad-hoc networks
    • Zhou, L. and Haas, Z.J. Securing ad-hoc networks, IEEE Network, 13, 6 (1999), 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.