메뉴 건너뛰기




Volumn 3, Issue 4, 2006, Pages 377-385

Secure location verification using radio broadcast

Author keywords

Location verification; Security; Wireless sensor networks

Indexed keywords

PROBLEM SOLVING; RADIO BROADCASTING; RADIO TRANSMISSION; SENSORS; TELECOMMUNICATION NETWORKS; TOPOLOGY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33751507355     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2006.57     Document Type: Article
Times cited : (70)

References (17)
  • 1
    • 3042593365 scopus 로고    scopus 로고
    • Dependable systems: Whisper: Local secret maintenance in sensor networks
    • V. Naik, A. Arora, S. Bapat, and M. Gouda, "Dependable Systems: Whisper: Local Secret Maintenance in Sensor Networks," IEEE Distributed Systems Online, vol. 4, 2003.
    • (2003) IEEE Distributed Systems Online , vol.4
    • Naik, V.1    Arora, A.2    Bapat, S.3    Gouda, M.4
  • 5
    • 0013393580 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • D.E. Denning and P.J. Denning, eds., ACM Press/Addison-Wesley
    • D.E. Denning and P.P. MacDoran, "Location-Based Authentication: Grounding Cyberspace for Better Security," Internet Besieged: Countering Cyberspace Scofflaws, D.E. Denning and P.J. Denning, eds., pp. 167-174, ACM Press/Addison-Wesley, 1998,
    • (1998) Internet Besieged: Countering Cyberspace Scofflaws , pp. 167-174
    • Denning, D.E.1    MacDoran, P.P.2
  • 6
    • 33751515086 scopus 로고    scopus 로고
    • reprint from, Elsevier Science, Ltd., Feb.
    • reprint from Computer Fraud and Security, Elsevier Science, Ltd., Feb. 1996.
    • (1996) Computer Fraud and Security
  • 7
    • 33751533670 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks
    • Y.C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks," Proc. INFOCOM, 2003.
    • (2003) Proc. INFOCOM
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 10
    • 33751545792 scopus 로고    scopus 로고
    • Secure positioning in wireless networks
    • special issue on security in wireless ad hoc networks, to appear
    • S. Capkun and J.P. Hubaux, "Secure Positioning in Wireless Networks," IEEE J. Selected Areas in Comm., special issue on security in wireless ad hoc networks, to appear.
    • IEEE J. Selected Areas in Comm.
    • Capkun, S.1    Hubaux, J.P.2
  • 12
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • T. Kindberg and K. Zhang, "Validating and Securing Spontaneous Associations between Wireless Devices," Proc. ISW: Int'l Workshop Information Security, pp. 44-53, 2003.
    • (2003) Proc. ISW: Int'l Workshop Information Security , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 13
    • 0032218225 scopus 로고    scopus 로고
    • How to prove where you are: Tracking the location of customer equipment
    • E. Gabber and A. Wool, "How to Prove where You Are: Tracking the Location of Customer Equipment," Proc. Fifth ACM Conf. Computer and Comm. Security, pp. 142-149, 1998.
    • (1998) Proc. Fifth ACM Conf. Computer and Comm. Security , pp. 142-149
    • Gabber, E.1    Wool, A.2
  • 17
    • 84860049679 scopus 로고    scopus 로고
    • Tinypk Project
    • Tinypk Project, http://www.is.bbn.com/projects/lws-nest/, 2005.
    • (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.