메뉴 건너뛰기




Volumn 4610 LNCS, Issue , 2007, Pages 3-12

ZigBee security using identity-based cryptography

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; ELECTRIC POWER UTILIZATION; NETWORK PROTOCOLS; SECURITY OF DATA; SPECIFICATIONS;

EID: 38049046046     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73547-2_3     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 35248874429 scopus 로고    scopus 로고
    • Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identitybased Cryptography
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Boyen, X.: Multipurpose Identity-based Signcryption: A Swiss Army Knife for Identitybased Cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 382-398. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 382-398
    • Boyen, X.1
  • 8
    • 0032649638 scopus 로고    scopus 로고
    • The Tate Pairing and the Discrete Algorithm Applied to Elliptic Curve Cryptosystems
    • Frey, G., Muller, M., Ruck, H.: The Tate Pairing and the Discrete Algorithm Applied to Elliptic Curve Cryptosystems. IEEE Transactions on Information Theory 45, 1717-1718 (1999)
    • (1999) IEEE Transactions on Information Theory , vol.45 , pp. 1717-1718
    • Frey, G.1    Muller, M.2    Ruck, H.3
  • 9
    • 49049089688 scopus 로고    scopus 로고
    • Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295-310. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 295-310
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 11
    • 38049059718 scopus 로고    scopus 로고
    • IEEE Std 802.15.4-2003. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Computer Society (2003)
    • IEEE Std 802.15.4-2003. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs), IEEE Computer Society (2003)
  • 12
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203-209 (1987)
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 14
    • 38049061991 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology, http://www.nist.gov
  • 15
    • 38049034242 scopus 로고    scopus 로고
    • ZigBee Security Specification Overview
    • Hong Kong
    • Reddy, J.: ZigBee Security Specification Overview. ZigBee Open House presentation, Hong Kong (2005)
    • (2005) ZigBee Open House presentation
    • Reddy, J.1
  • 16
  • 17
    • 85020598353 scopus 로고
    • Identity-based Cryptosystems and Signature Schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 20
    • 33750089718 scopus 로고    scopus 로고
    • Veigner, C., Rong, C.: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, 4158, pp. 521-530. Springer, Heidelberg (2006)
    • Veigner, C., Rong, C.: On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 521-530. Springer, Heidelberg (2006)
  • 22
    • 38049077789 scopus 로고    scopus 로고
    • Alliance
    • ZigBee Alliance, http://www.zigbee.org
    • ZigBee1
  • 23
    • 38049028976 scopus 로고    scopus 로고
    • ZigBee Alliance. ZigBee Specification 1.1 (2005)
    • ZigBee Alliance. ZigBee Specification 1.1 (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.