메뉴 건너뛰기




Volumn 20, Issue 6, 2007, Pages 1371-1375

Cluster-based strategies for public key authentication in wireless sensor networks

Author keywords

Clustering algorithm; Deployment knowledge; Strategy for public key authentication; Wireless sensor networks

Indexed keywords


EID: 34548164270     PISSN: 10041699     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (10)
  • 1
    • 0142103313 scopus 로고    scopus 로고
    • Security and Privacy in Sensor Networks
    • Chan H, Perrig A. Security and Privacy in Sensor Networks, IEEE Computer, 2003, 36(10): 103-105.
    • (2003) IEEE Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 3
    • 34548159529 scopus 로고    scopus 로고
    • Gura N, Patel A, Wander A, H. Hberle & Chang Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. CHES, August 2004: 11-13.
    • Gura N, Patel A, Wander A, H. Hberle & Chang Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. CHES, August 2004: 11-13.
  • 4
    • 33646581008 scopus 로고    scopus 로고
    • Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. Pervasive Computing and Communications [C] // 2005. PerCom 2005
    • March
    • Wander A S, Gura N, Eberle H, Gupta V, Shantz SC. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. Pervasive Computing and Communications [C] // 2005. PerCom 2005, Third IEEE International Conference on8-12 March 2005: 324-328.
    • (2005) Third IEEE International Conference on8-12 , pp. 324-328
    • Wander, A.S.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Shantz, S.C.5
  • 6
    • 20344381294 scopus 로고    scopus 로고
    • Malan D J, Welsh M, and Smith M D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, October 2004.
    • Malan D J, Welsh M, and Smith M D. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography[C]//The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, October 2004.
  • 8
    • 34548174739 scopus 로고    scopus 로고
    • Eastlake D and Jones P. Us Secure Hash Algorithm 1 (SHA1) [C]// IETF RFC 3174, September 2001.
    • Eastlake D and Jones P. Us Secure Hash Algorithm 1 (SHA1) [C]// IETF RFC 3174, September 2001.
  • 9
    • 34548157787 scopus 로고    scopus 로고
    • Madiraju, Mallanda S, Kannan C, Durresi R, Iyengar A, S. S. EBRP: Energy Band Based Routing Protocol for Wireless Sensor Networks . Intelligent Sensors[C]//Sensor Networks and Information Processing Conference, 2004. Proceedings of the 2004, 14-17 Dec. 2004: 67-71.
    • Madiraju, Mallanda S, Kannan C, Durresi R, Iyengar A, S. S. EBRP: Energy Band Based Routing Protocol for Wireless Sensor Networks . Intelligent Sensors[C]//Sensor Networks and Information Processing Conference, 2004. Proceedings of the 2004, 14-17 Dec. 2004: 67-71.
  • 10
    • 8344262333 scopus 로고    scopus 로고
    • Wenliang Du; Jing Deng, Han Y S, Shigang Chen; Varshney, P. K. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge [C]// INFOCOM 2004, Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies 1, March 2004: 7-11.
    • Wenliang Du; Jing Deng, Han Y S, Shigang Chen; Varshney, P. K. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge [C]// INFOCOM 2004, Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies Volume 1, March 2004: 7-11.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.