메뉴 건너뛰기




Volumn 3934 LNCS, Issue , 2006, Pages 32-42

Forward secure communication in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; DATA COMMUNICATION SYSTEMS; DATA PRIVACY; SECURITY OF DATA; SENSORS;

EID: 33745850722     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734666_4     Document Type: Conference Paper
Times cited : (10)

References (21)
  • 2
    • 18844420431 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • Report 2001/035
    • Mihir Bellare and Bennet Yee. Forward-security in private-key cryptography. Cryptology ePrint Archive, Report 2001/035, 2001.
    • (2001) Cryptology EPrint Archive
    • Bellare, M.1    Yee, B.2
  • 4
    • 33745847572 scopus 로고    scopus 로고
    • Epidemic-style monitoring in large-scale sensor networks
    • Vrije Universiteit Amsterdam, March
    • Daniela Gavidia, Spyros Voulgaris, and Maarten van Steen. Epidemic-style monitoring in large-scale sensor networks. Technical Report IR-CS-012.05, Vrije Universiteit Amsterdam, March 2005. http://www.cs.vu.nl/pub/papers/globe/IR-CS-012.05.pdf.
    • (2005) Technical Report , vol.IR-CS-012.05
    • Gavidia, D.1    Voulgaris, S.2    Van Steen, M.3
  • 6
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • F. Hu and N. Sharma. Security considerations in ad hoc sensor networks. Ad Hoc Networks, 3(1):69-89, 2005.
    • (2005) Ad Hoc Networks , vol.3 , Issue.1 , pp. 69-89
    • Hu, F.1    Sharma, N.2
  • 10
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • February
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication, February 1997. RFC 2104.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 11
    • 1542267055 scopus 로고    scopus 로고
    • Assessing security-critical energy-efficient sensor networks
    • University of Twente, The Netherlands, July
    • Y. W. Law, S. Dulman, S. Etalle, and P. Havinga. Assessing security-critical energy-efficient sensor networks. Technical Report TR-CTIT-02-18, University of Twente, The Netherlands, July 2002. http://purl.Org/utwente//38381.
    • (2002) Technical Report , vol.TR-CTIT-02-18
    • Law, Y.W.1    Dulman, S.2    Etalle, S.3    Havinga, P.4
  • 12
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Donggang Liu, Peng Ning, and Rongfang Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41-77, 2005.
    • (2005) ACM Trans. Inf. Syst. Secur. , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 14
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to "privacy-friendly" tags
    • MIT, MA, USA, November
    • Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. Cryptographic approach to "privacy-friendly" tags. In RFID Privacy Workshop, MIT, MA, USA, November 2003.
    • (2003) RFID Privacy Workshop
    • Ohkubo, M.1    Suzuki, K.2    Kinoshita, S.3
  • 15
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Adrian Perrig, John Stankovic, and David Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 16
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler, Spins: security protocols for sensor networks. Wirel. Netw., 8(5):521-534, 2002.
    • (2002) Wirel. Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 17
    • 4344567712 scopus 로고    scopus 로고
    • Kerberos assisted authentication in mobile ad-hoc networks
    • Darlinghurst, Australia, Australia, Australian Computer Society, Inc.
    • Asad Amir Pirzada and Chris McDonald. Kerberos assisted authentication in mobile ad-hoc networks. In CRPIT '04: Proceedings of the 27th conference on Australasian computer science, pages 41-46, Darlinghurst, Australia, Australia, 2004. Australian Computer Society, Inc.
    • (2004) CRPIT '04: Proceedings of the 27th Conference on Australasian Computer Science , pp. 41-46
    • Pirzada, A.A.1    McDonald, C.2
  • 20
    • 33745165448 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • Shandong University, Shandong, China, June
    • Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding collisions in the full SHA-1. Technical report, Shandong University, Shandong, China, June 2005.
    • (2005) Technical Report
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 21
    • 14344260955 scopus 로고    scopus 로고
    • Robust key establishment in sensor networks
    • Yongge Wang. Robust key establishment in sensor networks. SIGMOD Rec., 33(1):14-19, 2004.
    • (2004) SIGMOD Rec. , vol.33 , Issue.1 , pp. 14-19
    • Wang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.