메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Maximum supported network coverage area and cost evaluation of key pre-distribution schemes

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; ALUMINUM; COST BENEFIT ANALYSIS; COSTS; FORESTRY; HUMIDITY CONTROL; IMAGE RESOLUTION; NATURAL GAS WELL PRODUCTION; NETWORK PERFORMANCE; PUBLIC KEY CRYPTOGRAPHY; SENSOR NODES; SENSORS; TELECOMMUNICATION EQUIPMENT;

EID: 57549087250     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1389586.1389636     Document Type: Conference Paper
Times cited : (2)

References (17)
  • 2
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • Proceedings of Advances in Cryptology, Crypto'92, Springer-Verlag
    • C. Blundo, A. D. Santic, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Proceedings of Advances in Cryptology - Crypto'92, Lecture Notes in Computer Science, volume 740. pages 471-486. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 471-486
    • Blundo, C.1    Santic, A.D.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 8
    • 0022489112 scopus 로고
    • Transmission range control in multihop packet radio networks
    • T. Hou and V. Li. Transmission range control in multihop packet radio networks. IEEE Transactions on Communications, 1986.
    • (1986) IEEE Transactions on Communications
    • Hou, T.1    Li, V.2
  • 11
    • 24144503356 scopus 로고    scopus 로고
    • Deterministic key predistribution schemes for distributed sensor networks
    • 11th International Workshop on Selected Areas in Cryptography, of, Springer
    • J. Lee and D. Stinson. Deterministic key predistribution schemes for distributed sensor networks. In 11th International Workshop on Selected Areas in Cryptography, volume 3357 of Lecture Notes in Computer Science. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3357
    • Lee, J.1    Stinson, D.2
  • 13
    • 0028514601 scopus 로고
    • An authentication service for computer networks
    • September
    • B. C. Neuman and T. T. Kerberos. An authentication service for computer networks. IEEE Communications, 32(9):33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Kerberos, T.T.2
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 15
    • 0037615371 scopus 로고    scopus 로고
    • The strange logic of random, graphs, algorithms and combinatoric
    • Springer-Verlag
    • J. Spencer. The strange logic of random, graphs, algorithms and combinatoric. Algorithms and Combinatorics 22. Springer-Verlag, 2000.
    • (2000) Algorithms and Combinatorics , vol.22
    • Spencer, J.1
  • 16
    • 0021386815 scopus 로고
    • Optimal transmission ranges for randomly distributed packet radio terminals
    • H. Takagi and L. Kleinrock. Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Transactions on Communications, 1984.
    • (1984) IEEE Transactions on Communications
    • Takagi, H.1    Kleinrock, L.2
  • 17
    • 33748033020 scopus 로고    scopus 로고
    • Taking sensor networks from lab to the jungle
    • A. S. Tanenbaum, C. Gamage, and B. Crispo. Taking sensor networks from lab to the jungle. Computer, 39(8):98-100, 2006.
    • (2006) Computer , vol.39 , Issue.8 , pp. 98-100
    • Tanenbaum, A.S.1    Gamage, C.2    Crispo, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.