메뉴 건너뛰기




Volumn 3, Issue 4, 2007, Pages

A canonical seed assignment model for key predistribution in wireless sensor networks

Author keywords

Key establishment; Key predistribution; Network models; Sensor networks

Indexed keywords

KEY ESTABLISHMENT; KEY PREDISTRIBUTION; NETWORK MODELS; SECURE NETWORK;

EID: 35349015881     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1281492.1281494     Document Type: Article
Times cited : (24)

References (35)
  • 1
    • 0013427153 scopus 로고
    • Probabilistic methods in extremal finite set theory
    • ALON, N. 1991. Probabilistic methods in extremal finite set theory. In Extremal Problems for Finite Sets, 39-57.
    • (1991) Extremal Problems for Finite Sets , pp. 39-57
    • ALON, N.1
  • 5
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Advances in Cryptology: Proceedings of the EUROCRYPT'84. Paris, France
    • BLOM, R. 1984. An optimal class of symmetric key generation systems. In Advances in Cryptology: Proceedings of the EUROCRYPT'84. Paris, France. Lecture Notes in Computer Science, vol. 209, 335-338.
    • (1984) Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • BLOM, R.1
  • 6
    • 85028765277 scopus 로고
    • Perfectlysecure key distribution for dynamic conferences
    • Advances in Cryptology: Proceedings of the CRYPTO'92. Santa Barbara, CA
    • BLUNDO, C., SANTIS, A. D., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1992. Perfectlysecure key distribution for dynamic conferences. In Advances in Cryptology: Proceedings of the CRYPTO'92. Santa Barbara, CA, Lecture Notes in Computer Science, vol. 740, 471-486.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 471-486
    • BLUNDO, C.1    SANTIS, A.D.2    HERZBERG, A.3    KUTTEN, S.4    VACCARO, U.5    YUNG, M.6
  • 7
    • 35348993814 scopus 로고    scopus 로고
    • CARMAN, D. W., KRUUS, P. S., AND MATT, B. J. 2000. Constraints and approaches for distributed sensor network security. Tech. rep. #00-010, NAI Labs.
    • CARMAN, D. W., KRUUS, P. S., AND MATT, B. J. 2000. Constraints and approaches for distributed sensor network security. Tech. rep. #00-010, NAI Labs.
  • 8
    • 35048867517 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for distributed sensor networks
    • Proceedings of the 9th European Symposium on Research in Computer Security ESORICS'04, Sophia Antipolis, France
    • ÇAMTEPE, S. A. AND YENER, B. 2004. Combinatorial design of key distribution mechanisms for distributed sensor networks. In Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS'04). Sophia Antipolis, France. Lecture Notes in Computer Science, vol. 3193. 293-308.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 293-308
    • ÇAMTEPE, S.A.1    YENER, B.2
  • 16
    • 0000934255 scopus 로고
    • Families of finite sets in which no set is covered by the union of two others
    • ERDÖS, P., FRANKL, P., AND FÜREDI, Z. 1982. Families of finite sets in which no set is covered by the union of two others. J. Combinat. Theory, Series A 33, 158-166.
    • (1982) J. Combinat. Theory, Series A , vol.33 , pp. 158-166
    • ERDÖS, P.1    FRANKL, P.2    FÜREDI, Z.3
  • 17
    • 51249175955 scopus 로고
    • Families of finite sets in which no set is covered by the union of r others
    • ERDÖS, P., FRANKL, P., AND FÜREDI, Z. 1985. Families of finite sets in which no set is covered by the union of r others. Israel J. Math. 51, 1-2.
    • (1985) Israel J. Math , vol.51 , pp. 1-2
    • ERDÖS, P.1    FRANKL, P.2    FÜREDI, Z.3
  • 21
    • 0025212474 scopus 로고
    • A matrix key distribution scheme
    • GONG, L. AND WHEELER, D. J. 1990. A matrix key distribution scheme. J Cryptol. 2, 1, 51-59.
    • (1990) J Cryptol , vol.2 , Issue.1 , pp. 51-59
    • GONG, L.1    WHEELER, D.J.2
  • 25
    • 35349026221 scopus 로고
    • An elementary proof of inclusion-exclusion formulas
    • JOHNSON, B. R. 1980. An elementary proof of inclusion-exclusion formulas. Amer. Math. Month. 87, 9, 750-751.
    • (1980) Amer. Math. Month , vol.87 , Issue.9 , pp. 750-751
    • JOHNSON, B.R.1
  • 26
    • 24144503356 scopus 로고    scopus 로고
    • Deterministic key predistribution schemes for distributed sensor networks
    • Selected Areas in Cryptography SAC2004, Waterloo, Ontario, Canada
    • LEE, J. AND STINSON, D. R. 2004. Deterministic key predistribution schemes for distributed sensor networks. In Selected Areas in Cryptography (SAC2004). Waterloo, Ontario, Canada. Lecture Notes in Computer Science, vol. 3357, 294-307.
    • (2004) Lecture Notes in Computer Science , vol.3357 , pp. 294-307
    • LEE, J.1    STINSON, D.R.2
  • 27
    • 84949023663 scopus 로고
    • Secret-key agreement without public-key cryptography
    • Advances in Cryptology: Proceedings of CRYPTO'93, Santa Barbara, CA
    • LEIGHTON, T. AND MICALI, S. 1993. Secret-key agreement without public-key cryptography. In Advances in Cryptology: Proceedings of (CRYPTO'93). Santa Barbara, CA. Lecture Notes in Computer Science, vol. 773, 456-479.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 456-479
    • LEIGHTON, T.1    MICALI, S.2
  • 29
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • LIU, D., NING, P., AND LI, R. 2005. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Secur. 8, 1, 41-77.
    • (2005) ACM Trans. Inform. Syst. Secur , vol.8 , Issue.1 , pp. 41-77
    • LIU, D.1    NING, P.2    LI, R.3
  • 30
  • 31
    • 0033471867 scopus 로고    scopus 로고
    • On k-connectivity for a geometric random graph
    • PENROSE, M. 1999. On k-connectivity for a geometric random graph. W. Rand. Struct. Algor. 15, 2, 145-164.
    • (1999) W. Rand. Struct. Algor , vol.15 , Issue.2 , pp. 145-164
    • PENROSE, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.