메뉴 건너뛰기




Volumn 4572 LNCS, Issue , 2007, Pages 232-246

New strategies for revocation in ad-hoc networks

Author keywords

Credential revocation; Key management; Sensor networks

Indexed keywords

AD HOC NETWORKS; BROADCASTING; MATHEMATICAL MODELS; PARAMETER ESTIMATION;

EID: 38149015558     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73275-4_17     Document Type: Conference Paper
Times cited : (37)

References (23)
  • 3
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • S&P, pp, IEEE Computer Society Press, Los Alamitos
    • Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (S&P), pp. 197-213. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.X.3
  • 4
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • ACM, New York
    • Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: 10th ACM CCS, pp. 42-51. ACM, New York (2003)
    • (2003) 10th ACM CCS , pp. 42-51
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 5
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • ACM Press, New York
    • Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM CCS, pp. 52-61. ACM Press, New York (2003)
    • (2003) 10th ACM CCS , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 6
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • ACM Press, New York
    • Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM CCS, pp. 62-72. ACM Press, New York (2003)
    • (2003) 10th ACM CCS , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 8
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 10
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • IEEE Computer Society Press, Los Alamitos
    • Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In: IEEE S&P, IEEE Computer Society, pp. 49-63. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) IEEE S&P, IEEE Computer Society , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.D.3
  • 11
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • IEEE Computer Society Press, Los Alamitos
    • Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless networks. In: 22nd IEEE INFOCOM, IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) 22nd IEEE INFOCOM
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 12
    • 84976295016 scopus 로고
    • Distance-bounding protocols (extended abstract)
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 13
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol. In: IEEE Secure Comm
    • Los Alamitos
    • Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: IEEE Secure Comm., pp. 67-73. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) IEEE Computer Society Press , pp. 67-73
    • Hancke, G.P.1    Kuhn, M.G.2
  • 19
    • 33748079781 scopus 로고    scopus 로고
    • Suicide for the common good: A new strategy for credential revocation in self-organizing systems
    • Clulow, J., Moore, T.: Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS OSR 40(3), 18-21 (2006)
    • (2006) ACM SIGOPS OSR , vol.40 , Issue.3 , pp. 18-21
    • Clulow, J.1    Moore, T.2
  • 20
    • 0033690336 scopus 로고    scopus 로고
    • Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Ecient authentication and signing of multicast streams over lossy channels. In: IEEE S&P, pp. 56-73. IEEE Computer Society Press, Los Alamitos (2000)
    • Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Ecient authentication and signing of multicast streams over lossy channels. In: IEEE S&P, pp. 56-73. IEEE Computer Society Press, Los Alamitos (2000)
  • 21
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 23
    • 14744271851 scopus 로고    scopus 로고
    • The economics of resisting censorship
    • Danezis, G., Anderson, R.: The economics of resisting censorship. IEEE Security & Privacy 3(1), 45-50 (2005)
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 45-50
    • Danezis, G.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.