메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 1925-1930

Security methods for wireless sensor networks

Author keywords

Key; Method; Protocol; Security; Wireless sensor networks

Indexed keywords

AD HOC NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; TARGET TRACKING;

EID: 34247188995     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMA.2006.257548     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 2
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
    • Middletown, NJ, October
    • F. Stajano, R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks", 3rd AT&T Software Symposium, Middletown, NJ, October 1999.
    • (1999) 3rd AT&T Software Symposium
    • Stajano, F.1    Anderson, R.2
  • 4
    • 34247259765 scopus 로고    scopus 로고
    • C.Karlof, Y.Li, and J.P olastre.ARRIVE: An Architecture for Robust Routing In Volatile Environments.Technical Report UCB/CSD-03-1233, University of California at Berkeley, Mar.2003.
    • C.Karlof, Y.Li, and J.P olastre.ARRIVE: An Architecture for Robust Routing In Volatile Environments.Technical Report UCB/CSD-03-1233, University of California at Berkeley, Mar.2003.
  • 7
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Los Alamitos, CA: IEEE Computer Society, May 11-14
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proceedings of 2003 Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, May 11-14 2003, pp. 197-215.
    • (2003) Proceedings of 2003 Symposium on Security and Privacy , pp. 197-215
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 11
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • EUROCRYPT'84, Paris, France: Springer-Verlag
    • R. Blom, "An optimal class of symmetric key generation systems," in EUROCRYPT'84, ser. Lecture Notes in Computer Science, vol. 209. Paris, France: Springer-Verlag, 1985, pp. 335-338.
    • (1985) ser. Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • Blom, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.