메뉴 건너뛰기




Volumn 3, Issue 3, 2008, Pages 414-423

A network coding approach to secret key distribution

Author keywords

Network coding; Secret key distribution; Sensor networks

Indexed keywords

CHLORINE COMPOUNDS; INFORMATION THEORY; INTERNET PROTOCOLS; KEYS (FOR LOCKS); MOBILE DEVICES; NETWORK PROTOCOLS; PROGRAMMING THEORY; PUBLIC KEY CRYPTOGRAPHY; SENSORS; TELECOMMUNICATION EQUIPMENT; WIRELESS NETWORKS; WIRELESS SENSOR NETWORKS;

EID: 49549125198     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.928538     Document Type: Article
Times cited : (43)

References (21)
  • 2
    • 38349010472 scopus 로고    scopus 로고
    • Network coding protocols for secret key distribution
    • Nov
    • P. F. Oliveira and J. Barros, "Network coding protocols for secret key distribution," in Proc Int. Symp. Information Security, Nov. 2007, pp. 1718-1733.
    • (2007) Proc Int. Symp. Information Security , pp. 1718-1733
    • Oliveira, P.F.1    Barros, J.2
  • 4
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
    • presented at the, Santa Clara, CA, Oct, Online, Available
    • D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography," presented at the 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, Oct. 2004. [Online]. Available: citeseer.ist.psu.edu/ malan04publickey.html.
    • (2004) 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and Networks
    • Malan, D.1    Welsh, M.2    Smith, M.3
  • 5
    • 0036738266 scopus 로고    scopus 로고
    • SPINS : Security protocols for sensor networks
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS : Security protocols for sensor networks," Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wireless Netw , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 9
    • 49549114532 scopus 로고    scopus 로고
    • S. Deb, M. Effros, T. Ho, D. Karger, R. Koetter, D. Lun, M. Medard, and N. Ratnakar, Network coding for wireless applications: A brief tutorial, presented at the IWWAN, London, U.K., May 2005.
    • S. Deb, M. Effros, T. Ho, D. Karger, R. Koetter, D. Lun, M. Medard, and N. Ratnakar, "Network coding for wireless applications: A brief tutorial," presented at the IWWAN, London, U.K., May 2005.
  • 11
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson, B. Christiansen, B. Crispo, J. A. Malcolm, and M. Roe, Eds, Security Pmtocols Workshop, Sci, Springer
    • F. Stajano and R. J. Anderson, B. Christiansen, B. Crispo, J. A. Malcolm, and M. Roe, Eds., "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Security Pmtocols Workshop, 1999, vol. 1796, pp. 172-194, Lecture Notes Comput. Sci., Springer.
    • (1999) Lecture Notes Comput , vol.1796 , pp. 172-194
  • 12
    • 0013413164 scopus 로고    scopus 로고
    • New York: Wiley, Feb. 2002, Online, Available
    • F. Stajano, Security for Ubiquitous Computing. New York: Wiley, Feb. 2002. [Online]. Available: http://www.cl.cam.ac.uk/fms27/secubicomp/.
    • Security for Ubiquitous Computing
    • Stajano, F.1
  • 13
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. S. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Amer. Inst. Elect. Eng., vol. XLV, pp. 109-115, 1926.
    • (1926) J. Amer. Inst. Elect. Eng , vol.45 , pp. 109-115
    • Vernam, G.S.1
  • 15
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2-3, pp. 293-315, 2003.
    • (2003) Ad Hoc Netw , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 16
    • 5044242517 scopus 로고    scopus 로고
    • Byzantine modification detection in multicast networks using randomized network coding
    • presented at the, Information Theory, Chicago, IL, Jul
    • T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," presented at the IEEE Int. Symp. Information Theory, Chicago, IL, Jul. 2004.
    • (2004) IEEE Int. Symp
    • Ho, T.1    Leong, B.2    Koetter, R.3    Medard, M.4    Effros, M.5    Karger, D.6
  • 18
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 20
    • 33745855808 scopus 로고    scopus 로고
    • Tampering with motes: Real-world physical attacks on wireless sensor networks
    • A. Becher, Z. Benenson, and M. Dornseif, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds, Proc. 3rd Int. Conf. Security Pervasive Comput, York, U.K, Apr. 18-21, Springer, Sci
    • A. Becher, Z. Benenson, and M. Dornseif, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., "Tampering with motes: Real-world physical attacks on wireless sensor networks," in Proc. 3rd Int. Conf. Security Pervasive Comput., York, U.K., Apr. 18-21, 2006, vol. 3934, pp. 104-118, Springer, 2006, ser. Lecture Notes Comput. Sci.
    • (2006) ser. Lecture Notes Comput , vol.3934 , pp. 104-118
  • 21
    • 51649118865 scopus 로고    scopus 로고
    • Random, linear network, coding: A free cipher?
    • presented at the, Information Theory, Jun
    • L. Lima, M. Medard, and J. Barros, "Random, linear network, coding: A free cipher?," presented at the IEEE Int. Symp. Information Theory, Jun. 2007.
    • (2007) IEEE Int. Symp
    • Lima, L.1    Medard, M.2    Barros, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.