메뉴 건너뛰기




Volumn , Issue , 2008, Pages 573-577

Rabbit-MAC: Lightweight Authenticated Encryption in Wireless Sensor Networks

Author keywords

Authentication; Confidentiality; Integrity; Rabbit MAC; Wireless Sensor Networks

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER NETWORKS; CRYPTOGRAPHY; DATA STORAGE EQUIPMENT; ENERGY EFFICIENCY; HYBRID SENSORS; NETWORK PROTOCOLS; QUALITY ASSURANCE; SENSOR NETWORKS; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 54249097802     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICINFA.2008.4608065     Document Type: Conference Paper
Times cited : (12)

References (12)
  • 1
    • 49149099123 scopus 로고    scopus 로고
    • Department of Computer Science, University of Tennessee, Knoxville
    • Mayank Saraogi, "Security in Wireless Sensor Networks" Department of Computer Science, University of Tennessee, Knoxville.
    • Security in Wireless Sensor Networks
    • Saraogi, M.1
  • 4
    • 4243082091 scopus 로고    scopus 로고
    • Security in Wireless Sensor Networks
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 8
    • 11144340927 scopus 로고    scopus 로고
    • Designing Secure Sensor Networks
    • December
    • Elaine Shi and Adrian Perrig, "Designing Secure Sensor Networks", IEEE Wireless Communications, pp 38-43 December 2004.
    • (2004) IEEE Wireless Communications , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 10
    • 54249158126 scopus 로고    scopus 로고
    • Martin Boesgaard, Mette Vesterager, Thomas Christensen, Erik Zenner The Stream Cipher Rabbit ECRYPT Stream Cipher Project Report 2005/006.
    • Martin Boesgaard, Mette Vesterager, Thomas Christensen, Erik Zenner "The Stream Cipher Rabbit" ECRYPT Stream Cipher Project Report 2005/006.
  • 11
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
    • T, Okamoto ed
    • M. Bellare and C. Namprempre, "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm", Lecture Notes in Computer Science Vol. 1976, T, Okamoto ed, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976
    • Bellare, M.1    Namprempre, C.2
  • 12
    • 54249118879 scopus 로고    scopus 로고
    • http://www.hitachiappliances.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.