메뉴 건너뛰기




Volumn , Issue , 2008, Pages 185-194

Catch me (If you can): Data survival in unattended sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

IDENTIFICATION (CONTROL SYSTEMS); SENSORS;

EID: 49149089237     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2008.31     Document Type: Conference Paper
Times cited : (108)

References (15)
  • 1
    • 33745797863 scopus 로고    scopus 로고
    • Untraceable rfid tags via insubvertible encryption
    • G. Ateniese, J. Camenisch, and B. de Medeiros. Untraceable rfid tags via insubvertible encryption. In CCS '05, pages 92-101, 2005.
    • (2005) CCS '05 , pp. 92-101
    • Ateniese, G.1    Camenisch, J.2    de Medeiros, B.3
  • 2
    • 49149122758 scopus 로고    scopus 로고
    • Towards plaintext-aware public-key encryption without random oracles. Cryptology ePrint Archive
    • Report 2004/221
    • M. Bellare and A. Palacio. Towards plaintext-aware public-key encryption without random oracles. Cryptology ePrint Archive, Report 2004/221, 2004.
    • (2004)
    • Bellare, M.1    Palacio, A.2
  • 3
    • 35248891000 scopus 로고    scopus 로고
    • Forward-security in private-key cryptography
    • M. Bellare and B. S. Yee. Forward-security in private-key cryptography. In CT-RSA, pages 1-18, 2003.
    • (2003) CT-RSA , pp. 1-18
    • Bellare, M.1    Yee, B.S.2
  • 5
    • 1542300188 scopus 로고    scopus 로고
    • Dependable and secure data storage and retrieval in mobile, wireless networks
    • S. Chessa and P. Maestrini. Dependable and secure data storage and retrieval in mobile, wireless networks. In DSN 2003, pages 207-216, 2003.
    • (2003) DSN 2003 , pp. 207-216
    • Chessa, S.1    Maestrini, P.2
  • 7
    • 84947441722 scopus 로고    scopus 로고
    • Robust and efficient sharing of rsa functions
    • R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of rsa functions. In CRYPTO, pages 157-172, 1996.
    • (1996) CRYPTO , pp. 157-172
    • Gennaro, R.1    Jarecki, S.2    Krawczyk, H.3    Rabin, T.4
  • 9
    • 15344340443 scopus 로고    scopus 로고
    • Data replication effectiveness in mobile ad-hoc networks
    • V. Gianuzzi. Data replication effectiveness in mobile ad-hoc networks. In ACM PE-WASUN '04, pages 17-22, 2004.
    • (2004) ACM PE-WASUN '04 , pp. 17-22
    • Gianuzzi, V.1
  • 10
    • 85008556094 scopus 로고    scopus 로고
    • Data replication for improving data accessibility in ad hoc networks
    • T. Hara and S. K. Madria. Data replication for improving data accessibility in ad hoc networks. IEEE Trans. Mob. Comput., 5:1515-1532, 2006.
    • (2006) IEEE Trans. Mob. Comput , vol.5 , pp. 1515-1532
    • Hara, T.1    Madria, S.K.2
  • 13
    • 85027164480 scopus 로고
    • How to withstand mobile virus attacks
    • R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In PODC, pages 51-59, 1991.
    • (1991) PODC , pp. 51-59
    • Ostrovsky, R.1    Yung, M.2
  • 14
    • 33144467802 scopus 로고    scopus 로고
    • Secure data communication in mobile ad hoc networks
    • P. Papadimitratos and Z. Haas. Secure data communication in mobile ad hoc networks. IEEE JSAC, 24(2):343-356, 2006.
    • (2006) IEEE JSAC , vol.24 , Issue.2 , pp. 343-356
    • Papadimitratos, P.1    Haas, Z.2
  • 15
    • 49149112695 scopus 로고    scopus 로고
    • Oaep reconsidered. Cryptology ePrint Archive
    • Report 2000/060
    • V. Shoup. Oaep reconsidered. Cryptology ePrint Archive, Report 2000/060, 2000.
    • (2000)
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.