메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 228-233

Key management for wireless sensor networks using trusted neighbors

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL PROPERTIES; KEY MANAGEMENTS; NEIGHBOURING NODES; NETWORK DEPLOYMENTS; SECURE COMMUNICATION LINKS; SECURE COMMUNICATIONS; SIMULATION RESULTS; TECHNICAL CHALLENGES; WIRELESS COMMUNICATIONS;

EID: 63149164405     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EUC.2008.125     Document Type: Conference Paper
Times cited : (2)

References (13)
  • 2
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences. In E. F. Brickell (editor): Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992
    • Proceedings, Springer-Verlag, Berlin
    • C. Blundo, A. de Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung: Perfectly-secure key distribution for dynamic conferences. In E. F. Brickell (editor): Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings. Lecture Notes in Computer Science 740, 471-486, Springer-Verlag, Berlin, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 471-486
    • Blundo, C.1    de Santis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 7
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • S. Jajodia, V. Atluri, T. Jaeger editors, Washingtion, DC, USA, October 27-30, ACM Press, New York
    • D. Liu, P. Ning: Establishing pairwise keys in distributed sensor networks. In S. Jajodia, V. Atluri, T. Jaeger (editors): Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003. 52-61, ACM Press, New York, 2003.
    • (2003) Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003 , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 8
    • 84866860550 scopus 로고    scopus 로고
    • Improving key predistribution with deployment knowledge in static sensor networks
    • D. Liu, P. Ning: Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 1 (2005), 204-239.
    • (2005) ACM Transactions on Sensor Networks , vol.1 , pp. 204-239
    • Liu, D.1    Ning, P.2
  • 9
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • C. Pomerance editor, Advances in Cryptology-CRYPTO '87,AConfer-ence on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, Springer-Verlag, Berlin
    • R. C. Merkle: A digital signature based on a conventional encryption function. In C. Pomerance (editor): Advances in Cryptology-CRYPTO '87,AConfer-ence on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings. Lecture Notes in Computer Science 293, 369-378, Springer-Verlag, Berlin, 1988.
    • (1988) Lecture Notes in Computer Science , vol.293 , pp. 369-378
    • Merkle, R.C.1
  • 12
    • 57549087250 scopus 로고    scopus 로고
    • Y. Xue, H. Jürgensen: Maximum supported network coverage area and cost evaluation of key pre-distribution schemes. In F. Makedon, L. Bailie (editors): Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to As-sistive Environments, PETRA 2008, Athens, Greece, July 16-18, 2008.ACM International Conference Proceedings Series 282, Association for Computing Machinery, New York, 2008. [Article No. 42], 8 Pages.
    • Y. Xue, H. Jürgensen: Maximum supported network coverage area and cost evaluation of key pre-distribution schemes. In F. Makedon, L. Bailie (editors): Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to As-sistive Environments, PETRA 2008, Athens, Greece, July 16-18, 2008.ACM International Conference Proceedings Series 282, Association for Computing Machinery, New York, 2008. [Article No. 42], 8 Pages.
  • 13
    • 63149146677 scopus 로고    scopus 로고
    • Y. Xue, H. Jürgensen. Secure paths in wireless networks with real-world attackers, 2008. Manuscript, in preparation.
    • Y. Xue, H. Jürgensen. Secure paths in wireless networks with real-world attackers, 2008. Manuscript, in preparation.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.