메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Secure monitoring scheme based on identity-based threshold signcryption for wireless sensor networks

Author keywords

Identity based cryptography; Secure monitoring; Threshold signcryption; Wireless sensor networks

Indexed keywords

CRYPTOGRAPHY; HYBRID SENSORS; METROPOLITAN AREA NETWORKS; MOBILE COMPUTING; ROUTING PROTOCOLS; SECURITY OF DATA; SENSOR NETWORKS; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 58049089548     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WiCom.2008.892     Document Type: Conference Paper
Times cited : (1)

References (10)
  • 2
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • February
    • D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, February 2005.
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 3
    • 58049102892 scopus 로고    scopus 로고
    • Geng Yang, Chunming Rong and Christian Veigner etc, al. Identity-Based Key Agreement and Encryption For Wireless Sensor Networks, International Journal of Computer Science and Network Security, 6, no.5B, pp. 182-189, May 2006.
    • Geng Yang, Chunming Rong and Christian Veigner etc, al. "Identity-Based Key Agreement and Encryption For Wireless Sensor Networks," International Journal of Computer Science and Network Security, vol.6, no.5B, pp. 182-189, May 2006.
  • 4
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or how to achieve cost (signature & encryption)cost(signature)+cost(encryption)
    • Advances in Crypto-logy-CRYPTO'97, Berlin: Springer- Verlag, pp
    • Y. Zheng, "Digital Signcryption or how to achieve cost (signature & encryption)«cost(signature)+cost(encryption)," Advances in Crypto-logy-CRYPTO'97, LNCS 1294, Berlin: Springer- Verlag, pp. 165-179, 1997.
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 5
    • 58049097872 scopus 로고    scopus 로고
    • J. Malone-Lee, Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, 2002. Available from: http://eprint.iacr.org/ 2002/098.
    • J. Malone-Lee, "Identity based signcryption. Cryptology ePrint Archive," Report 2002/098, 2002. Available from: http://eprint.iacr.org/ 2002/098.
  • 9
    • 58049117824 scopus 로고    scopus 로고
    • Study on Signcryption Schemes from Bilinear Pairings,
    • PhD thesis, Xidian Unviersity, Jan
    • F. Li., "Study on Signcryption Schemes from Bilinear Pairings," PhD thesis, Xidian Unviersity, Jan 2007.
    • (2007)
    • Li, F.1
  • 10
    • 33646827174 scopus 로고    scopus 로고
    • An identity-based threshold signcryption scheme with semantic security
    • Computational Intelligence and Security-CIS, Berlin: Springer-Verlag, pp
    • C. Peng and X. Li., "An identity-based threshold signcryption scheme with semantic security," Computational Intelligence and Security-CIS 2005, LNAI 3802, Berlin: Springer-Verlag, pp: 173-179, 2005.
    • (2005) LNAI , vol.3802 , pp. 173-179
    • Peng, C.1    Li, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.