메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Efficient access control for wireless sensor data

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL SCHEMES; COMPUTATIONAL CAPACITY; CRYPTOGRAPHIC HASH FUNCTIONS; DATA ENCRYPTION; HIGH SENSITIVITY; KEY GENERATION; SENSOR DATA; SIMPLE OPERATION; STORAGE REQUIREMENTS; WIRELESS SENSOR DATA; WIRELESS SENSOR NODE;

EID: 69949158071     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2008.4699487     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst., 1(3):239-248, 1983.
    • (1983) ACM Trans. Comput. Syst , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 38049016958 scopus 로고    scopus 로고
    • Incorporating temporal capabilities in existing key management schemes
    • M. J. Atallah, M. Blanton, and K. B. Frikken. Incorporating temporal capabilities in existing key management schemes. In ESORICS, pages 515-530, 2007.
    • (2007) ESORICS , pp. 515-530
    • Atallah, M.J.1    Blanton, M.2    Frikken, K.B.3
  • 3
    • 68849116303 scopus 로고    scopus 로고
    • Incorporating temporal capabilities in existing key management schemes. Cryptology ePrint Archive
    • Report 2007/245
    • M. J. Atallah, M. Blanton, and K. B. Frikken. Incorporating temporal capabilities in existing key management schemes. Cryptology ePrint Archive, Report 2007/245, 2007.
    • (2007)
    • Atallah, M.J.1    Blanton, M.2    Frikken, K.B.3
  • 4
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO, pages 1-15, 1996.
    • (1996) CRYPTO , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 9
    • 84979291225 scopus 로고
    • Broadcast encryption
    • A. Fiat and M. Naor. Broadcast encryption. In CRYPTO, pages 480-491, 1993.
    • (1993) CRYPTO , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 10
    • 69949183741 scopus 로고    scopus 로고
    • J.-O. Mauborgne and G. Vernam. One time pad scheme. at http://en. wikipedia.orgAviki/One-time-pad.
    • J.-O. Mauborgne and G. Vernam. One time pad scheme. at http://en. wikipedia.orgAviki/One-time-pad.
  • 12
    • 24344501341 scopus 로고    scopus 로고
    • Access control in collaborative systems
    • W. Tolone, G.-J. Ahn, T. Pai, and S.-P. Hong. Access control in collaborative systems. ACM Comput. Surv., 37(1):29-41, 2005.
    • (2005) ACM Comput. Surv , vol.37 , Issue.1 , pp. 29-41
    • Tolone, W.1    Ahn, G.-J.2    Pai, T.3    Hong, S.-P.4
  • 13
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W. G. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 14(1):182-188, 2002.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.G.1
  • 15
    • 33947655924 scopus 로고    scopus 로고
    • Security of chien's efficient time-bound hierarchical key assignment scheme
    • X. Yi. Security of chien's efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 17(9): 1298-1299, 2005.
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.9 , pp. 1298-1299
    • Yi, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.