메뉴 건너뛰기




Volumn 58, Issue 5, 2003, Pages 2976-2980

Runtime security composition for sensor networks (SecureSense)

Author keywords

[No Author keywords available]

Indexed keywords

RESOURCE CONSTRAINTS; SECURITY SERVICES; SENSOR NETWORKS; TARGET TRACKING; APPLICATION REQUIREMENTS; EXTERNAL ENVIRONMENTS; INTERNAL CONSTRAINTS; LINK LAYER SECURITY; MEMORY CONSUMPTION; SECURITY REQUIREMENTS; SERVICE COMPOSITIONS;

EID: 4143054544     PISSN: 07400551     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (6)
  • 1
    • 0034445661 scopus 로고    scopus 로고
    • System architecture directions for networked sensors
    • November
    • J. Hill, et al, "System architecture directions for networked sensors," in Proceedings of ACM ASPLOS IX, November 2000.
    • (2000) Proceedings of ACM ASPLOS IX
    • Hill, J.1
  • 2
    • 84862394515 scopus 로고    scopus 로고
    • http://www.cs.berkeley.edu/~nks/tinysec/
  • 3
    • 4143075680 scopus 로고
    • The RC5 encryption algorithm
    • Spring
    • R.L. Rivest, The RC5 encryption algorithm, CryptoBytes (1) 1 (Spring 1995).
    • (1995) CryptoBytes (1) , vol.1
    • Rivest, R.L.1
  • 4
    • 0037912259 scopus 로고    scopus 로고
    • A network-centric approach to embedded software for tiny devices
    • Oct
    • D. E. Culler, et al. "A Network-Centric Approach to Embedded Software for Tiny Devices". EMSOFT 2001, Oct 2001
    • (2001) EMSOFT 2001
    • Culler, D.E.1
  • 6
    • 0034771605 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • July Rome, Italy
    • A. Perrig, et al, "SPINS: Security Protocols for Sensor Networks". Mobicom 2001, July 2001, Rome, Italy.
    • (2001) Mobicom 2001
    • Perrig, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.