메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1251-1259

DP 2AC: Distributed privacy-preserving access control in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL SCHEMES; BLIND SIGNATURES; CENTRAL COMPONENT; COMMUNICATION OVERHEADS; DATA ACCESS PATTERNS; DISTRIBUTED TECHNIQUES; PERFORMANCE EVALUATION; PRIVACY PRESERVING; PUBLICLY VERIFIABLE; STORAGE OVERHEAD; USER IDENTITY;

EID: 70349658629     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062039     Document Type: Conference Paper
Times cited : (43)

References (27)
  • 1
    • 33748074817 scopus 로고    scopus 로고
    • Data storage placement in sensor networks
    • Florence, Italy, May
    • B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006, pp. 344-355.
    • (2006) ACM MobiHoc'06 , pp. 344-355
    • Sheng, B.1    Li, Q.2    Mao, W.3
  • 2
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • Urbana-Champaign, IL, USA, May
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
    • (2005) ACM MobiHoc'05 , pp. 378-389
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 3
    • 33746086383 scopus 로고    scopus 로고
    • Distributed user access control in sensor networks
    • San Francisco, CA, June
    • H. Wang and Q. Li, "Distributed user access control in sensor networks," in DCOSS'06, San Francisco, CA, June 2006, pp. 305-320.
    • (2006) DCOSS'06 , pp. 305-320
    • Wang, H.1    Li, Q.2
  • 4
    • 84863520818 scopus 로고    scopus 로고
    • Efficient and distributed access control in sensor networks
    • Santa Fe, New Mexico, USA, June
    • D. Liu, "Efficient and distributed access control in sensor networks," in DCOSS '07, Santa Fe, New Mexico, USA, June 2007.
    • (2007) DCOSS '07
    • Liu, D.1
  • 5
    • 43549089535 scopus 로고    scopus 로고
    • Multi-user broadcast authentication in wireless sensor networks
    • San Diego, CA, June
    • K. Ren, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," in IEEE SECON'07, San Diego, CA, June 2007, pp. 223-232.
    • (2007) IEEE SECON'07 , pp. 223-232
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 6
    • 34548302064 scopus 로고    scopus 로고
    • pDCS: Security and privacy support for data-centric sensor networks
    • Anchorage, Alaska, USA, May
    • M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007, pp. 1298-1306.
    • (2007) IEEE INFOCOM'07 , pp. 1298-1306
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 7
    • 33750012404 scopus 로고    scopus 로고
    • Y. Zhou, Y. Zhang, and Y. Fang, Access control in wireless sensor networks, Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, 5, no. 1, pp. 3-13, Jan. 2007.
    • Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, no. 1, pp. 3-13, Jan. 2007.
  • 8
    • 84869621366 scopus 로고    scopus 로고
    • ORION
    • ORION, http://www.joiscience.org/ocean-observing/advisors.
  • 9
    • 84869614604 scopus 로고    scopus 로고
    • NOPP
    • NOPP, http://www.nopp.org/.
  • 10
    • 84869605836 scopus 로고    scopus 로고
    • IOOS
    • IOOS, http://www.ocean.us/.
  • 11
    • 48049100992 scopus 로고    scopus 로고
    • Query privacy in wireless sensor networks
    • San Diego, CA, USA, June
    • B. Carbunar, Y. Yu, L. Shi, M. Pearce, and V. Vasudevan, "Query privacy in wireless sensor networks," in SECON '07, San Diego, CA, USA, June 2007, pp. 203-212.
    • (2007) SECON '07 , pp. 203-212
    • Carbunar, B.1    Yu, Y.2    Shi, L.3    Pearce, M.4    Vasudevan, V.5
  • 12
    • 33746373934 scopus 로고    scopus 로고
    • A novel privacy preserving authentication and access control scheme for pervasive computing environment
    • K. Ren, W. Lou, K. Kim, and R. Deng, "A novel privacy preserving authentication and access control scheme for pervasive computing environment," in IEEE Transactions on Vehicular Technology, 2006.
    • (2006) IEEE Transactions on Vehicular Technology
    • Ren, K.1    Lou, W.2    Kim, K.3    Deng, R.4
  • 13
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Washington, DC, Oct
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 62-72.
    • (2003) ACM CCS'03 , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 14
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Oakland, CA, May
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in S&P'03, Oakland, CA, May 2003, pp. 197-213.
    • (2003) S&P'03 , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 15
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington, DC, Oct
    • D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 52-61.
    • (2003) ACM CCS'03 , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 16
    • 33144476837 scopus 로고    scopus 로고
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, Location-based compromise tolerant security mechanisms for wireless sensor networks, IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, 24, no. 2, pp. 247-260, Feb. 2006.
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromise tolerant security mechanisms for wireless sensor networks," IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006.
  • 17
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Springer-Verlag
    • D. Chaum, "Blind signatures for untraceable payments," in Advances in Cryptology - Crypto '82. Springer-Verlag (1983), 1982, pp. 199-203.
    • (1982) Advances in Cryptology - Crypto '82 , pp. 199-203
    • Chaum, D.1
  • 18
    • 34848855786 scopus 로고    scopus 로고
    • Combating double-spending using cooperative P2P system
    • Toronto, Canada, June
    • I. Osipkov, E. Y. Vasserman, N. Hopper, and Y. Kim, "Combating double-spending using cooperative P2P system," in ICDCS'07, Toronto, Canada, June 2007.
    • (2007) ICDCS'07
    • Osipkov, I.1    Vasserman, E.Y.2    Hopper, N.3    Kim, Y.4
  • 19
  • 20
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Oct
    • D. Chaum, "Security without identification: transaction systems to make big brother obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985.
    • (1985) Comm. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 22
    • 34247376029 scopus 로고    scopus 로고
    • Securing the deluge network programming system
    • Nashville, Tennessee, Apr
    • P. Dutta, J. Hui, D. Chu, and D. Culler, "Securing the deluge network programming system," in IPSN'06, Nashville, Tennessee, Apr. 2006, pp. 326-333.
    • (2006) IPSN'06 , pp. 326-333
    • Dutta, P.1    Hui, J.2    Chu, D.3    Culler, D.4
  • 23
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and rsa on 8-bit cpus
    • Boston, MA, Aug
    • N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus," in CHES'04, Boston, MA, Aug. 2004, pp. 119-132.
    • (2004) CHES'04 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 24
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • Boston, MA, Aug
    • B. Karp and H. Kung, "GPSR: Greedy perimeter stateless routing for wireless networks," in ACM MOBICOM'00, Boston, MA, Aug. 2000, pp. 243-254.
    • (2000) ACM MOBICOM'00 , pp. 243-254
    • Karp, B.1    Kung, H.2
  • 25
    • 33751069036 scopus 로고    scopus 로고
    • Double rulings for information brokerage in sensor networks
    • Los Angeles, California, USA, Sept
    • R. Sarkar, X. Zhu, and J. Gao, "Double rulings for information brokerage in sensor networks," in ACM MOBICOM'06, Los Angeles, California, USA, Sept. 2006, pp. 286-297.
    • (2006) ACM MOBICOM'06 , pp. 286-297
    • Sarkar, R.1    Zhu, X.2    Gao, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.