메뉴 건너뛰기




Volumn , Issue , 2006, Pages

An efficient key management scheme for secure sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

GATEWAYS (COMPUTER NETWORKS); NETWORK ARCHITECTURE; OPTIMIZATION; SECURITY OF DATA; WIRELESS SENSOR NETWORKS;

EID: 34547376528     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2006.43     Document Type: Conference Paper
Times cited : (2)

References (19)
  • 2
    • 84884730529 scopus 로고
    • An Optimal Class of Symmetric Key Generation System, in Advances in Cryptology - Eurocrypt84
    • R. Blom. An Optimal Class of Symmetric Key Generation System, in Advances in Cryptology - Eurocrypt84, LNCS vol. 209, p. 335-338, 1985.
    • (1985) LNCS , vol.209 , pp. 335-338
    • Blom, R.1
  • 3
    • 84948984838 scopus 로고
    • Space requirements for broadcast encryption, in Advances in Cryptology - Eurocrypt94
    • C. Blundo, and A. Cresti. Space requirements for broadcast encryption, in Advances in Cryptology - Eurocrypt94, LNCS vol. 950, p. 471-486, 1994.
    • (1994) LNCS , vol.950 , pp. 471-486
    • Blundo, C.1    Cresti, A.2
  • 4
    • 85028765277 scopus 로고    scopus 로고
    • C. Blundo, A. De Santi, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure Key Distribution for Dynamic Conferences, in Advances in Cryptogology - Crypto92, LNCS 740, p. 471-486, 1993.
    • C. Blundo, A. De Santi, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure Key Distribution for Dynamic Conferences, in Advances in Cryptogology - Crypto92, LNCS vol. 740, p. 471-486, 1993.
  • 6
    • 0037086890 scopus 로고    scopus 로고
    • I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,Wireless sensor networks:a survey. Computer Networks, 38:393-422, December. 2002.
    • I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,Wireless sensor networks:a survey. Computer Networks, 38:393-422, December. 2002.
  • 8
    • 34547320420 scopus 로고    scopus 로고
    • H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks, to appear in proc. IEEE Symposium of Privacy and Security 03, May 2003.
    • H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks, to appear in proc. IEEE Symposium of Privacy and Security 03, May 2003.
  • 9
    • 0035728669 scopus 로고    scopus 로고
    • B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. Secure Group Communications for Wireless Networks, in proc. IEEE MILCOM01, Oct. 2001.
    • B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. Secure Group Communications for Wireless Networks, in proc. IEEE MILCOM01, Oct. 2001.
  • 10
  • 11
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, and V. D. Gligor. A Key-Management Scheme for Distributed Sensor Networks, in proc. ACM CCS02, Nov. 2002.
    • L. Eschenauer, and V. D. Gligor. A Key-Management Scheme for Distributed Sensor Networks, in proc. ACM CCS02, Nov. 2002.
  • 12
    • 84979291225 scopus 로고
    • Broadcast Encryption, in Advances in Cryptology - Crypto93
    • A. Fiat, and M. Naor. Broadcast Encryption, in Advances in Cryptology - Crypto93, LNCS vol. 773, p. 480-491, 1994.
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 14
    • 84937435227 scopus 로고    scopus 로고
    • The LSD Broadcast Encryption Scheme, in Advances in Cryptology
    • LNCS
    • D. Halevy, and A. Shamir. The LSD Broadcast Encryption Scheme, in Advances in Cryptology - Crypto2002, LNCS vol. 2442, p. 47-60, 2002.
    • (2002) Crypto2002 , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 15
    • 0141770051 scopus 로고    scopus 로고
    • Communication-efficient group key agreement
    • Y. Kim, A. Perrig, and G. Tsudik. Communication-efficient group key agreement, in proc. IFIP SEC01, 2001.
    • (2001) proc. IFIP
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 17
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in Large Networks of Computers
    • R. Needham, and M. Schroeder. Using Encryption for Authentication in Large Networks of Computers, in Commu. of ACM, vol. 21, no. 12, p. 993-999, 1978.
    • (1978) Commu. of ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 19
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers, in Advances in Cryptology - Crypto01
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers, in Advances in Cryptology - Crypto01, LNCS vol. 2139, p. 41-62, 2001.
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.