메뉴 건너뛰기




Volumn 3868 LNCS, Issue , 2006, Pages 83-98

Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; HIERARCHICAL SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SENSOR DATA FUSION; TELECOMMUNICATION NETWORKS;

EID: 33745569997     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11669463_9     Document Type: Conference Paper
Times cited : (18)

References (19)
  • 2
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems, advances in cryptography
    • LNCS, Springer-Verlag
    • Blom, R.: An optimal class of symmetric key generation systems, Advances in Cryptography, Proceedings EUROCRYPT 84, LNCS, Springer-Verlag, 209, pp. 335-338, 1985.
    • (1985) Proceedings EUROCRYPT 84 , vol.209 , pp. 335-338
    • Blom, R.1
  • 3
    • 85028765277 scopus 로고
    • Perfectly secure key distribution for dynamic conferences
    • Advances in Cryptology - CRYPTO '92
    • Blundo, C., DE Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M.: Perfectly secure key distribution for dynamic conferences, In Advances in Cryptology - CRYPTO '92, LNCS 740, pp. 471-486, 1993.
    • (1993) LNCS , vol.740 , pp. 471-486
    • Blundo, C.1    De Santis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • Diffie, W., Hellman, M. E.: New directions in cryptography, IEEE Trans. Inform. Theory, IT-22, pp. 644-654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 10
    • 14844335004 scopus 로고    scopus 로고
    • Revisiting random key pre-distribution schemes for wireless sensor networks
    • Workshop on Security of ad hoc and Sensor Networks archive
    • Hwang, J. M., Kim, Y. D.: Revisiting random key pre-distribution schemes for wireless sensor networks, Workshop on Security of ad hoc and Sensor Networks archive, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43 - 52, 2004.
    • (2004) Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks , pp. 43-52
    • Hwang, J.M.1    Kim, Y.D.2
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2): pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 18
    • 23944447698 scopus 로고    scopus 로고
    • A security architecture for mobile wireless sensor networks
    • Security in Ad-hoc and Sensor Networks, Springer-Verlag Berlin Heidelberg
    • Schmidt, JS., Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks, Security in Ad-hoc and Sensor Networks, LNCS 3313, pp 166-177, Springer-Verlag Berlin Heidelberg 2005
    • (2005) LNCS , vol.3313 , pp. 166-177
    • Schmidt, J.S.1    Krahn, H.2    Fischer, S.3    Watjen, D.4
  • 19
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • October
    • Wood, A.,Stankovic, J. A.: Denial of Service in Sensor Networks, IEEE Computer, 35(10): pp. 54-62, October 2002.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.