메뉴 건너뛰기




Volumn 238, Issue , 2007, Pages 333-348

MUQAMI: A locally distributed key management scheme for clustered sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION TECHNOLOGY;

EID: 36649026691     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-73655-6_22     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 5
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981).
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 6
    • 33646921841 scopus 로고    scopus 로고
    • Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks
    • M. Younis, K. Ghumman, and M. Eltoweissy, Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks, IEEE Trans. Parallel and Distrib. Sys. 17(8), 865-882(2006).
    • (2006) IEEE Trans. Parallel and Distrib. Sys , vol.17 , Issue.8 , pp. 865-882
    • Younis, M.1    Ghumman, K.2    Eltoweissy, M.3
  • 8
    • 10944266504 scopus 로고    scopus 로고
    • HEED: A Hybrid, Energy-Efficient, Distributed lustering Approach for Ad Hoc Sensor Networks
    • O. Younis and S. Fahmy, HEED: A Hybrid, Energy-Efficient, Distributed lustering Approach for Ad Hoc Sensor Networks, IEEE Trans. Mobile Computing 3(4), 366-379 (2004).
    • (2004) IEEE Trans. Mobile Computing , vol.3 , Issue.4 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 9
    • 0141509888 scopus 로고    scopus 로고
    • Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison
    • K. Langendoen and N. Reijers, Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison, Computer Networks 43(4), 499-518 (2003).
    • (2003) Computer Networks , vol.43 , Issue.4 , pp. 499-518
    • Langendoen, K.1    Reijers, N.2
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. of the ACM 21(2), 120-126 (1978).
    • (1978) Comm. of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 14
    • 36649012907 scopus 로고
    • The MD5 Message-Digest Algorithm, RFC 1320
    • Data Security Inc
    • R. Rivest, The MD5 Message-Digest Algorithm, RFC 1320, MIT and RSA Data Security Inc., (1992).
    • (1992) MIT and RSA
    • Rivest, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.