메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 279-288

A family of collusion resistant protocols for instantiating security

Author keywords

Collusion resistance; Instantiating security; Security

Indexed keywords

COLLUSION RESISTANCE; INSTANTIATING SECURITY;

EID: 33750953281     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2005.5     Document Type: Conference Paper
Times cited : (3)

References (16)
  • 1
    • 33744921035 scopus 로고    scopus 로고
    • Security instantiation in ad-hoc networks
    • A Preliminary Version Appears in Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS), June 2004, Florence, Italy.
    • Sandeep S. Kulkarni, Mohamed G. Gouda, and Anish Arora. Security instantiation in ad-hoc networks. Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks, 2005. A Preliminary Version Appears in Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS), June 2004, Florence, Italy.
    • (2005) Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks
    • Kulkarni, S.S.1    Gouda, M.G.2    Arora, A.3
  • 2
    • 0025212474 scopus 로고
    • A matrix key-distribution scheme
    • Li Gong and David J. Wheeler. A matrix key-distribution scheme. Journal of Cryptology, 2(1):51-59, 1990.
    • (1990) Journal of Cryptology , vol.2 , Issue.1 , pp. 51-59
    • Gong, L.1    Wheeler, D.J.2
  • 5
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6), 1999.
    • (1999) IEEE Network , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2
  • 7
    • 30344435127 scopus 로고    scopus 로고
    • Design of secure end-to-end protocols for mobile systems
    • V. Varadharajan and Y. Mu. Design of secure end-to-end protocols for mobile systems. Wireless, 1996.
    • (1996) Wireless
    • Varadharajan, V.1    Mu, Y.2
  • 8
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of ACM, 21:993-999, 1978.
    • (1978) Communications of ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 15
    • 84884730529 scopus 로고
    • An optimal class of key generation systems
    • Advances in Cryptology -Eurocrypt '84
    • R.Blom. An optimal class of key generation systems. Lecture Notes in Computer Science, pages 335-338, 1984. Advances in Cryptology -Eurocrypt '84.
    • (1984) Lecture Notes in Computer Science , pp. 335-338
    • Blom, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.