메뉴 건너뛰기




Volumn 3813 LNCS, Issue , 2005, Pages 54-67

Authenticated queries in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED DESIGN; COMPUTER NETWORKS; DATA ACQUISITION; DATA PRIVACY; QUERY LANGUAGES; SECURITY OF DATA; SENSORS;

EID: 33745759519     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11601494_5     Document Type: Conference Paper
Times cited : (4)

References (31)
  • 4
    • 0032661699 scopus 로고    scopus 로고
    • Multicast security: A taxonomy and some efficient constructions
    • New York, NY, Mar. IEEE
    • R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proc. IEEE INFOCOM'99, volume 2, pages 708-716, New York, NY, Mar. 1999. IEEE.
    • (1999) Proc. IEEE INFOCOM'99 , vol.2 , pp. 708-716
    • Canetti, R.1    Garay, J.2    Itkis, G.3    Micciancio, D.4    Naor, M.5    Pinkas, B.6
  • 5
    • 84876090772 scopus 로고    scopus 로고
    • Crossbow, Inc. MICA2 data sheet. Available at http://www.xbow.com/ Products/Product_pdf-files/Wireless_pdf/MICA2n_Datasheet.pdf.
    • MICA2 Data Sheet
  • 9
    • 23944459661 scopus 로고    scopus 로고
    • Public key cryptography in sensor networks - Revisited
    • G. Gaubatz, J.-P. Kaps, and B. Sunar. Public key cryptography in sensor networks - revisited. In ESAS, pages 2-18, 2004.
    • (2004) ESAS , pp. 2-18
    • Gaubatz, G.1    Kaps, J.-P.2    Sunar, B.3
  • 11
    • 35048818581 scopus 로고    scopus 로고
    • Comparing Elliptic curve cryptography and RSA on 8-bit CPUs
    • CHES2004
    • N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In CHES2004, volume 3156 of LNCS, 2004.
    • (2004) LNCS , vol.3156
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 17
    • 44049105799 scopus 로고    scopus 로고
    • Moteiv, Inc. Tmote Sky datasheet. Available athttp://www.moteiv.com/ products/docs/tmote-sky-datasheet.pdf.
    • Tmote Sky Datasheet
  • 20
    • 4544244334 scopus 로고    scopus 로고
    • SIA: Secure information aggregation in sensor networks
    • Nov
    • B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In ACM SenSys 2003, Nov 2003.
    • (2003) ACM SenSys 2003
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 21
    • 24644449780 scopus 로고    scopus 로고
    • Efficient cooperative signatures: A novel authentication scheme for sensor networks
    • number 3450 in LNCS, April
    • S. Seys and B. Preneel. Efficient cooperative signatures: A novel authentication scheme for sensor networks. In 2nd International Conference on Security in Pervasive Computing, number 3450 in LNCS, pages 86-100, April 2005.
    • (2005) 2nd International Conference on Security in Pervasive Computing , pp. 86-100
    • Seys, S.1    Preneel, B.2
  • 22
    • 23944488346 scopus 로고    scopus 로고
    • Exploring message authentication in sensor networks
    • Security in Ad-hoc and Sensor Networks (ESAS), First European Workshop, Springer
    • H. Vogt. Exploring message authentication in sensor networks. In Security in Ad-hoc and Sensor Networks (ESAS), First European Workshop, volume 3313 of Lecture Notes in Computer Science, pages 19-30. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3313 , pp. 19-30
    • Vogt, H.1
  • 24
    • 23944498188 scopus 로고    scopus 로고
    • Sdd: Secure distributed diffusion protocol for sensor networks
    • First European Workshop on Security in Ad-hoc and Sensor Networks (ESAS)
    • X. Wang, L. Yang, and K. Chen. Sdd: Secure distributed diffusion protocol for sensor networks. In First European Workshop on Security in Ad-hoc and Sensor Networks (ESAS), volume 3313 of Lecture Notes in Computer Science, pages 205-214, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3313 , pp. 205-214
    • Wang, X.1    Yang, L.2    Chen, K.3
  • 26
    • 4243182595 scopus 로고    scopus 로고
    • Networking support for query processing in sensor networks
    • A. Woo, S. Madden, and R. Govindan. Networking support for query processing in sensor networks. Commun. ACM, 47(6):47-52, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 47-52
    • Woo, A.1    Madden, S.2    Govindan, R.3
  • 27
    • 1442296009 scopus 로고    scopus 로고
    • The cougar approach to in-network query processing in sensor networks
    • Y. Yao and J. Gehrke. The cougar approach to in-network query processing in sensor networks. SIGMOD Rec., 31(3):9-18, 2002.
    • (2002) SIGMOD Rec. , vol.31 , Issue.3 , pp. 9-18
    • Yao, Y.1    Gehrke, J.2
  • 28
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM, 2004.
    • (2004) Proceedings of IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 30
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE Symposium on Security and Privacy, pages 259-271, 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 31
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
    • November
    • S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In IEEE International Conference on Network Protocols, November 2003.
    • (2003) IEEE International Conference on Network Protocols
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.