메뉴 건너뛰기




Volumn , Issue , 2008, Pages 167-172

Who is listening? Security in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

RISK ANALYSIS; RISK ASSESSMENT; SAFETY FACTOR; SIGNAL PROCESSING;

EID: 48149087287     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSCN.2008.4447182     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 2
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical innetwork aggregation in sensor networks
    • H. Chan, A. Porrig, and D. Song. Secure hierarchical innetwork aggregation in sensor networks. In ACM CCS, 2006.
    • (2006) ACM CCS
    • Chan, H.1    Porrig, A.2    Song, D.3
  • 3
    • 48149104494 scopus 로고    scopus 로고
    • P. C. Cheng, P. Rohatgi, and C. Keser. Fuzzy MLS: An experiment on quantified risk-adaptive access control. In IEEE Symposium on Security and Privacy, 2007.
    • P. C. Cheng, P. Rohatgi, and C. Keser. Fuzzy MLS: An experiment on quantified risk-adaptive access control. In IEEE Symposium on Security and Privacy, 2007.
  • 6
    • 48149104343 scopus 로고    scopus 로고
    • Information
    • Probabilistic encryption and how to play mental poker keeping secret all partial
    • S. Coldwasser and S. Micali. Probabilistic encryption and how to play mental poker keeping secret all partial Information. In 14th ACM STOC, pp 365377, 1982.
    • 14th ACM STOC, pp 365377, 1982
    • Coldwasser, S.1    Micali, S.2
  • 7
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzle: A cryptographic defense against connection depletion attacks
    • A. Juels and J. Brainard. Client puzzle: A cryptographic defense against connection depletion attacks. In NDSS, 1999.
    • (1999) NDSS
    • Juels, A.1    Brainard, J.2
  • 8
    • 34548145831 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countormoasuros
    • C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countormoasuros. In Elsevier's AdHoc Networks Journal, 2002.
    • (2002) Elsevier's AdHoc Networks Journal
    • Karlof, C.1    Wagner, D.2
  • 16
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT pp223-238, 1999.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 19
    • 85009012482 scopus 로고    scopus 로고
    • A reliable multicast data distribution protocol based on software fec techniques
    • L. Rizzo and L. Vicisano. A reliable multicast data distribution protocol based on software fec techniques. In 4th HPCS, 1997.
    • (1997) 4th HPCS
    • Rizzo, L.1    Vicisano, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.