메뉴 건너뛰기




Volumn 8, Issue 4, 2009, Pages 1814-1824

A multivariate key-establishment scheme for wireless sensor networks

Author keywords

Cryptography; Data security; Key pre distribution; Polynomials; Wireless sensor networks

Indexed keywords

DATA SECURITY; KEY PRE-DISTRIBUTION; MEMORY REQUIREMENTS; MULTIVARIATE POLYNOMIAL; NETWORK CONNECTIVITY; NETWORK DEPLOYMENT; SECRET KEY; SECURITY AND PERFORMANCE;

EID: 65949089027     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2009.071338     Document Type: Article
Times cited : (32)

References (19)
  • 2
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Y. Zhang R. W. Yeung and N. Cai "Location-based compromisetolerant security mechanisms for wireless sensor networks" IEEE J. Select. Areas Commun., vol. 24, No. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 3
    • 51349102138 scopus 로고    scopus 로고
    • Secure Broadcast Communication in Wired and Wireless Networks
    • and, Boston
    • A. Perrig and J. D. Tygar Secure Broadcast Communication in Wired and Wireless Networks. Boston: Kluwer Academic, 2003.
    • (2003) Kluwer Academic
    • Perrig, A.1    Tygar, J.D.2
  • 7
    • 28444433009 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • and, in
    • H. Chan A. Perrig and D. Song "Random key predistribution schemes for sensor networks" in Proc. Symp. Security and Privacy, 2003, pp. 197-213.
    • (2003) Proc. Symp. Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 10
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • and
    • D. Liu P. Ning and R. Li "Establishing pairwise keys in distributed sensor networks" ACM Trans. Inform. Syst. Secur., vol. 8, No. 1, pp. 41-77, 2005.
    • (2005) ACM Trans. Inform. Syst. Secur. , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 12
    • 0020890723 scopus 로고
    • R. Blom "Non-public key distribution" in Proc. Adv. Cryptol. - CRYPTO'82 D. Chaum R. L. Rivest and A. T. Sherman Eds. NY: Plenum Publishing, 1982, pp. 231-236. (Pubitemid 14519635)
    • (1983) NON-PUBLIC KEY DISTRIBUTION , pp. 231-236
    • Blom Rolf1
  • 13
    • 85028765277 scopus 로고
    • Perfectly-secure key distribution for dynamic conferences
    • in, Ed., Berlin: Springer-Verlag
    • C. Blundo et al. "Perfectly-secure key distribution for dynamic conferences" in Proc. Adv. Cryptol. - CRYPTO'92, ser. Lect. Notes Comput. Sci. E. F. Brickell, Ed., vol. 740. Berlin: Springer-Verlag, 1992, pp. 471-486.
    • (1992) Proc. Adv. Cryptol. - CRYPTO'92, ser. Lect. Notes Comput. Sci. , vol.740 , pp. 471-486
    • Blundo, C.1
  • 15
    • 39049083533 scopus 로고    scopus 로고
    • Threshold key-establishment in distributed sensor networks using a multivariate scheme
    • in, CD-ROM
    • - "Threshold key-establishment in distributed sensor networks using a multivariate scheme" in Proc. IEEE Conf. Comput. Commun. - INFOCOM'06 CD-ROM.
    • Proc. IEEE Conf. Comput. Commun. - INFOCOM'06


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.