메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 69-78

Local data protection for in-network processing in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; DATA PROCESSING; QUERY LANGUAGES; SECURITY OF DATA; SENSORS;

EID: 33745711696     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERSER.2005.1506392     Document Type: Conference Paper
Times cited : (1)

References (31)
  • 3
    • 35248891000 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • Lecture Notes in Computer Science, M. Joye ed, Springer-Verlag
    • M. Bellare and B. Yee. Forward-security in private-key cryptography. In Topics in Cryptology - CT-RSA '03, volume 2612. Lecture Notes in Computer Science, M. Joye ed, Springer-Verlag, 2003.
    • (2003) Topics in Cryptology - CT-RSA '03 , vol.2612
    • Bellare, M.1    Yee, B.2
  • 25
    • 4544244334 scopus 로고    scopus 로고
    • Sia: Secure information aggregation in sensor networks
    • November
    • B. Przydatek, D. Song, and A. Perrig. Sia: Secure information aggregation in sensor networks. In ACM SenSys, November 2003.
    • (2003) ACM SenSys
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 26
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-013, November 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-1013
    • Shamir, A.1
  • 28
    • 14344260955 scopus 로고    scopus 로고
    • Robust key establishment in sensor networks
    • March
    • Y. Wang. Robust key establishment in sensor networks. In SIGMOD Record, March 2004.
    • (2004) SIGMOD Record
    • Wang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.