메뉴 건너뛰기




Volumn 2775, Issue , 2003, Pages 27-39

A formally verified decentralized key management architecture for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURE; ENERGY UTILIZATION; INTEROPERABILITY; WIRELESS SENSOR NETWORKS;

EID: 33751047869     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39867-7_3     Document Type: Article
Times cited : (24)

References (14)
  • 1
    • 84937436045 scopus 로고    scopus 로고
    • Increasing the lifetime of a key: A comparative analysis of the security of rekeying techniques
    • T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, Springer-Verlag
    • M. Abdalla and M. Bellare. Increasing the lifetime of a key: A comparative analysis of the security of rekeying techniques. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, volume 1976 of LNCS, pages 546-565. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 546-565
    • Abdalla, M.1    Bellare, M.2
  • 6
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the verification of security protocols
    • M. Hermenegildo and G. Puebla, editors, Madrid, Spain, Sep Springer-Verlag
    • R. Corin and S. Etalle. An improved constraint-based system for the verification of security protocols. In M. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symp. (SAS), volume 2477, pages 326-341, Madrid, Spain, Sep 2002. Springer-Verlag.
    • (2002) 9th Int. Static Analysis Symp. (SAS) , vol.2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 7
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • USENIX Association, To appear
    • S.A. Crosby and D.S. Wallach. Denial of service via algorithmic complexity attacks. In 12th USENIX Security Symposium. USENIX Association, 2003. To appear.
    • (2003) 12th USENIX Security Symposium
    • Crosby, S.A.1    Wallach, D.S.2
  • 8
    • 4544290017 scopus 로고    scopus 로고
    • Secure selective exclusion in ad hoc wireless network
    • M.A. Ghonaimy, M.T. El-Hadidi, and H.K. Asian, editors, Kluwer Academic Publishers
    • R. di Pietro, L.V. Mancini, and S. Jajodia. Secure selective exclusion in ad hoc wireless network. In M.A. Ghonaimy, M.T. El-Hadidi, and H.K. Asian, editors, Security in the Information Society: Visions and Perspectives, pages 423-434. Kluwer Academic Publishers, 2002.
    • (2002) Security in the Information Society: Visions and Perspectives , pp. 423-434
    • Di Pietro, R.1    Mancini, L.V.2    Jajodia, S.3
  • 9
  • 10
    • 35248857083 scopus 로고    scopus 로고
    • On the security of CTR + CBC MAC
    • K. Nyberg and H.Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002), Springer-Verlag
    • J. Jonsson. On the security of CTR + CBC MAC. In K. Nyberg and H.Heys, editors, Selected Areas in Cryptography, 9th Annual Workshop (SAC 2002), volume 2595 of LNCS, pages 76-93. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2595 , pp. 76-93
    • Jonsson, J.1
  • 13
    • 84943263539 scopus 로고    scopus 로고
    • Datasheet
    • RF Monolithics, Inc. TR1001: 868.35 MHz Transceiver. Datasheet, http://www.rfm.com/products/data/tr1001.pdf.
    • TR1001: 868.35 MHz Transceiver


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.