메뉴 건너뛰기




Volumn , Issue , 2007, Pages 362-367

An access control scheme in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL SCHEMES; CONTROL CAPABILITIES; CONTROL METHODS; DOS ATTACKS; ENVIRONMENTAL MONITORING; INTERNATIONAL CONFERENCES; KEY CHAIN; MERKLE HASH TREE; PARALLEL COMPUTING; PUBLIC KEY (PK); QUERY SERVICES; SECURITY SERVICES; SERVICE PROVIDER (SP); WIRELESS SENSORS;

EID: 47849123313     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNPCW.2007.4351511     Document Type: Conference Paper
Times cited : (18)

References (14)
  • 1
    • 0036688074 scopus 로고    scopus 로고
    • A survey on sensor networks
    • PP
    • Akyildiz IF, et al. "A survey on sensor networks", IEEE Communications Magazine, 2002,40(8): PP. 102-114.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.8 , pp. 102-114
    • Akyildiz, I.F.1
  • 2
    • 77952532148 scopus 로고    scopus 로고
    • User authentication in sensor networks (extended abstract)
    • September
    • Z. Benenson, et al. "User authentication in sensor networks (extended abstract)", In Informatik 2004, Workshop on Sensor Networks, September 2004.
    • (2004) Informatik 2004, Workshop on Sensor Networks
    • Benenson, Z.1
  • 3
    • 33746862074 scopus 로고    scopus 로고
    • An algorithmic framework for robust access control in wireless sensor networks
    • January .PP
    • Z. Benenson, et al. "An algorithmic framework for robust access control in wireless sensor networks", In Second European Workshop on Wireless Sensor Networks (EWSN), January 2005.PP.158-165.
    • (2005) Second European Workshop on Wireless Sensor Networks (EWSN) , pp. 158-165
    • Benenson, Z.1
  • 4
    • 47849087076 scopus 로고    scopus 로고
    • Z.Benenson, N. et al. Realizing Robust User Authentication in Sensor Networks, Workshop on Real-World Wireless Sensor Networks (REALWSN), Stockholm Sweden, June 2005. PP: 135-142
    • Z.Benenson, N. et al. "Realizing Robust User Authentication in Sensor Networks", Workshop on Real-World Wireless Sensor Networks (REALWSN), Stockholm Sweden, June 2005. PP: 135-142
  • 6
    • 33750315272 scopus 로고    scopus 로고
    • Authenticated Query Flooding in Sensor Networks
    • Karlstad Sweden. May, PP
    • Zinaida Benenson et al. "Authenticated Query Flooding in Sensor Networks", PerCom Workshops 2006, Karlstad Sweden. May 2006, PP. 644-647.
    • (2006) PerCom Workshops 2006 , pp. 644-647
    • Benenson, Z.1
  • 7
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • December
    • Wang H. et al. "Elliptic curve cryptography-based access control in sensor networks", Int. J. Security and Networks. December 2006, pp. 127-137.
    • (2006) Int. J. Security and Networks , pp. 127-137
    • Wang, H.1
  • 8
    • 29844438193 scopus 로고    scopus 로고
    • Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks
    • May, Illinois USA.PP
    • Wensheng Zhang et al. "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks", MobiHoc'05, May 2005, Illinois USA.PP. 378-389
    • (2005) MobiHoc'05 , pp. 378-389
    • Zhang, W.1
  • 9
    • 47849120612 scopus 로고    scopus 로고
    • C. Blundo et al. Perfectly-secure key distribution for dynamic conferences, in Advances in Cryptology CRYPTO 92, LNCS, 1993, pp. 471-486.
    • C. Blundo et al. "Perfectly-secure key distribution for dynamic conferences", in Advances in Cryptology CRYPTO 92, LNCS, 1993, pp. 471-486.
  • 10
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and rsa on 8-bit cpus
    • Aug, Boston, MA, USA. Berlin, Germany:Springer-Verlag,PP
    • Gura, N. et al. "Comparing elliptic curve cryptography and rsa on 8-bit cpus", Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004), Aug 2004, Boston, MA, USA. Berlin, Germany:Springer-Verlag,PP. 119-132.
    • (2004) Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES , pp. 119-132
    • Gura, N.1
  • 11
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
    • Santa Clara California, October, PP
    • D. J. Malan et al. "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography", In First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara California, October 2004. PP.71-80.
    • (2004) First IEEE International Conference on Sensor and Ad Hoc Communications and Network , pp. 71-80
    • Malan, D.J.1
  • 13
    • 4244026973 scopus 로고    scopus 로고
    • From euclid's gcd to Montgomery multiplication to the great divide
    • Technical Report, Sun Microsystems Laboratories, June, TR-2001-95
    • Shantz, S.C. "From euclid's gcd to Montgomery multiplication to the great divide", Technical Report, Sun Microsystems Laboratories, June 2001, TR-2001-95.
    • (2001)
    • Shantz, S.C.1
  • 14
    • 33646569085 scopus 로고    scopus 로고
    • Gupta, et al. Sizzle: a standards-based end-to-end security architecture for the embedded Internet , Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on (2005), pp. 247-256.
    • Gupta, et al. "Sizzle: a standards-based end-to-end security architecture for the embedded Internet ", Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on (2005), pp. 247-256.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.