메뉴 건너뛰기




Volumn 1, Issue 1-2, 2006, Pages 50-63

Efficient anonymity schemes for clustered wireless sensor networks

Author keywords

Anonymity; Authentication; Clustering; Confidentiality; Privacy; Pseudonym; Wireless Sensor Networks (WSNs)

Indexed keywords

DATA PRIVACY; SENSOR NODES;

EID: 52249120873     PISSN: 17481279     EISSN: 17481287     Source Type: Journal    
DOI: 10.1504/IJSNET.2006.010834     Document Type: Article
Times cited : (68)

References (32)
  • 7
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J. and Rogaway, P. (2000) 'The security of the cipher block chaining message authentication code', Journal of Computer and System Sciences, Vol. 61, No. 3, pp. 362-399.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 13
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • Fiestel, H. (1973) 'Cryptography and computer privacy', Scientific American, Vol. 228, No. 5, pp. 15-23.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Fiestel, H.1
  • 14
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S. and Micali, S. (1986) 'How to construct random functions', Journal of the ACM, Vol. 33, No. 4, pp. 792-807.
    • (1986) Journal of the ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 23
    • 2442445104 scopus 로고    scopus 로고
    • A cluster based secure routing scheme for wireless ad hoc networks
    • IPCCC
    • Poosarla, R., Deng, H., Ojha, A. and Agarwal, D. P. (2004) 'A cluster based secure routing scheme for wireless ad hoc networks', IEEE, IPCCC, pp. 171-175.
    • (2004) IEEE , pp. 171-175
    • Poosarla, R.1    Deng, H.2    Ojha, A.3    Agarwal, D.P.4
  • 26
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M. and Carter, L. (1981) 'New hash functions and their use in authentication and set equality', Journal of Computing System Science, Vol. 22, pp. 265-279.
    • (1981) Journal of Computing System Science , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, L.2
  • 27
    • 22944492132 scopus 로고    scopus 로고
    • AO2P: Ad hoc on-demand position-based private routing protocol
    • Wu, X. and Bhargava, B. K. (2005) 'AO2P: ad hoc on-demand position-based private routing protocol', IEEE Transactions on Mobile Computation, Vol. 4, pp. 335-348.
    • (2005) IEEE Transactions on Mobile Computation , vol.4 , pp. 335-348
    • Wu, X.1    Bhargava, B.K.2
  • 32
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks
    • Zhu, S., Setia, S., Jajodia, S. and Ning, P. (2004b) 'An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks', IEEE Symposium on Security and Privacy, pp. 259-274.
    • (2004) IEEE Symposium on Security and Privacy , pp. 259-274
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.