메뉴 건너뛰기




Volumn 40, Issue 3, 2006, Pages 18-21

Suicide for the common good: A new strategy for credential revocation in self-organizing systems

Author keywords

[No Author keywords available]

Indexed keywords

DATA STORAGE EQUIPMENT; DECISION MAKING; INFORMATION THEORY; MOBILE TELECOMMUNICATION SYSTEMS; STRATEGIC PLANNING;

EID: 33748079781     PISSN: 01635980     EISSN: 01635980     Source Type: Conference Proceeding    
DOI: 10.1145/1151374.1151381     Document Type: Article
Times cited : (55)

References (22)
  • 1
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In EUROCRYPT, pages 344-359, 1993.
    • (1993) EUROCRYPT , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 2
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol
    • ACM
    • S. Buchegger and J.-Y. L. Boudec. Performance analysis of the confidant protocol. In MobiHoc, pages 226-236. ACM, 2002.
    • (2002) MobiHoc , pp. 226-236
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 3
    • 4544259841 scopus 로고    scopus 로고
    • Sector: Secure tracking of node encounters in multi-hop wireless networks
    • S. Setia and V. Swarup, editors. ACM
    • S. Capkun, L. Buttyán, and J.-P. Hubaux. Sector: secure tracking of node encounters in multi-hop wireless networks. In S. Setia and V. Swarup, editors, SASN, pages 21-32. ACM, 2003.
    • (2003) SASN , pp. 21-32
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.-P.3
  • 5
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • pages 197-. IEEE Computer Society
    • H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-. IEEE Computer Society, 2003.
    • (2003) IEEE Symposium on Security and Privacy
    • Chan, H.1    Perrig, A.2    Song, D.X.3
  • 7
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, IPTPS. Springer
    • J. R. Douceur. The Sybil attack. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, IPTPS, volume 2429 of Lecture Notes in Computer Science, pages 251-260. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 9
    • 14844315770 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • S. Setia and V. Swarup, editors. ACM
    • S. Ganeriwal and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. In S. Setia and V. Swarup, editors, SASN, pages 66-77. ACM, 2004.
    • (2004) SASN , pp. 66-77
    • Ganeriwal, S.1    Srivastava, M.B.2
  • 11
    • 0011255177 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
    • (Proposed Standard), Apr. 2002. Updated by RFC 4325
    • R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), Apr. 2002. Updated by RFC 4325.
    • RFC , vol.3280
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 12
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM, 2003.
    • (2003) INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 14
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad hoc networks
    • IEEE Computer Society
    • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad hoc networks. In ICNP, pages 251-260. IEEE Computer Society, 2001.
    • (2001) ICNP , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 15
    • 27944459744 scopus 로고    scopus 로고
    • Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    • IEEE Computer Society
    • D. Liu, P. Ning, and W. Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In ICDCS, pages 609-619. IEEE Computer Society, 2005.
    • (2005) ICDCS , pp. 609-619
    • Liu, D.1    Ning, P.2    Du, W.3
  • 16
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • B. Jerman-Blazic and T. Klobucar, editors, Communications and Multimedia Security. Kluwer
    • P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blazic and T. Klobucar, editors, Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, pages 107-121. Kluwer, 2002.
    • (2002) IFIP Conference Proceedings , vol.228 , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 17
    • 3042785862 scopus 로고    scopus 로고
    • The Sybil attack in sensor networks: Analysis & defenses
    • K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, editors. ACM
    • J. Newsome, E. Shi, D. X. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. In K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, editors, IPSN, pages 259-268. ACM, 2004.
    • (2004) IPSN , pp. 259-268
    • Newsome, J.1    Shi, E.2    Song, D.X.3    Perrig, A.4
  • 18
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • IEEE Computer Society
    • B. Parno, A. Perrig, and V. D. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, pages 49-63. IEEE Computer Society, 2005.
    • (2005) IEEE Symposium on Security and Privacy , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.D.3
  • 21
    • 0242624675 scopus 로고    scopus 로고
    • A reputation-based trust model for peer-to-peer ecommerce communities
    • ACM
    • L. Xiong and L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. In ACM Conference on Electronic Commerce, pages 228-229. ACM, 2003.
    • (2003) ACM Conference on Electronic Commerce , pp. 228-229
    • Xiong, L.1    Liu, L.2
  • 22
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.