메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 1-5

Efficient and authenticated key agreement mechanism in low-rate WPAN environment

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA STORAGE EQUIPMENT; PROBLEM SOLVING; PUBLIC POLICY; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33750417077     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (12)
  • 2
    • 33750399175 scopus 로고    scopus 로고
    • A security design for a general purpose, self-organizing, multihop ad hoc wireless network
    • Tom Messerges, Johnas Cukier, Tom A.M.Kevenaar, Larry Puhl, "A Security Design for a General Purpose, Self-Organizing, Multihop Ad Hoc Wireless Network", TR2003-114, 2004
    • (2004) TR2003-114
    • Messerges, T.1    Cukier, J.2    Kevenaar, T.A.M.3    Puhl, L.4
  • 3
    • 84871442641 scopus 로고    scopus 로고
    • On communication security in wireless ad-hoc sensor network
    • IEEE Computer Society
    • Slijepcevic, S. et al., "On communication security in wireless ad-hoc sensor network", WETICE, IEEE Computer Society, 2002
    • (2002) WETICE
    • Slijepcevic, S.1
  • 4
    • 0038341106 scopus 로고    scopus 로고
    • A key management scheme for distributed sensor networks
    • Eschenauer, L. and Gligor, V.D., "A key management scheme for distributed sensor networks, in 9th ACM Conference, 2002
    • (2002) 9th ACM Conference
    • Eschenauer, L.1    Gligor, V.D.2
  • 5
    • 33750393309 scopus 로고
    • ISO/IEC 9798-2, Information Technology - Security Techniques - Entity Authentication Mechanism - Part 2, International Standardization Organization
    • ISO/IEC 9798-2, Information Technology - Security Techniques - Entity Authentication Mechanism - Part 2, "Mechanisms Using Symmetric Encipherment Algorithm", International Standardization Organization, 1994
    • (1994) Mechanisms Using Symmetric Encipherment Algorithm
  • 7
    • 85015402934 scopus 로고
    • "Use of elliptic curves in cryptography
    • Springer-Verlag
    • Miller, Victor S., "Use of Elliptic Curves in Cryptography", Lecture Note in Computer Science, no.218, pp.417-426, Springer-Verlag, 1986
    • (1986) Lecture Note in Computer Science , Issue.218 , pp. 417-426
    • Miller, V.S.1
  • 10
    • 0003442755 scopus 로고    scopus 로고
    • Implementing elliptic curve cryptography
    • Michael Rosing, "Implementing Elliptic Curve Cryptography", MANNING, 1999
    • (1999) MANNING
    • Rosing, M.1
  • 12
    • 1542286901 scopus 로고    scopus 로고
    • Fast authenticated key establishment protocols for self-organizing sensor networks
    • Qiang Huang, et al., "Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks", WSNA'03, pp 141-150, 2003.
    • (2003) WSNA'03 , pp. 141-150
    • Huang, Q.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.