메뉴 건너뛰기




Volumn , Issue , 2009, Pages 264-273

ChainFarm: A novel authentication protocol for high-rate any source probabilistic broadcast

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION DELAYS; AUTHENTICATION PROTOCOLS; BROADCAST COMMUNICATION; BROADCAST SOURCE; BROADCAST TRAFFIC; CONTENT MODIFICATION; DATA DISSEMINATION; DENIAL OF SERVICE; EFFICIENT AUTHENTICATION; HIGH RATE; INFORMATION SHARING; MISSION CRITICAL APPLICATIONS; ONE WAY HASH CHAIN; PERFORMANCE IMPROVEMENTS; RESOURCE DISCOVERY; SIMULATION RESULT;

EID: 74249092013     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2009.5336988     Document Type: Conference Paper
Times cited : (2)

References (21)
  • 4
    • 25844529484 scopus 로고    scopus 로고
    • Performance comparison of scalable location services for geographic ad hoc routing
    • H. H. Y. Das, S.M. Pucha, "Performance comparison of scalable location services for geographic ad hoc routing," in INFOCOM, 2005.
    • INFOCOM, 2005
    • Das, H.H.Y.1    Pucha, S.M.2
  • 5
    • 27544460282 scopus 로고    scopus 로고
    • B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, Proceedings ofIEEE Symposium on Security and Privacy'05, 00, pp. 49-63, 2005.
    • B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," Proceedings ofIEEE Symposium on Security and Privacy'05, vol. 00, pp. 49-63, 2005.
  • 8
    • 10044284351 scopus 로고    scopus 로고
    • Leap: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in CCS '03, 2003.
    • CCS '03, 2003
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 9
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level j.1J tesla: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multi-level j.1J tesla: Broadcast authentication for distributed sensor networks," in TECS, 2004.
    • TECS, 2004
    • Liu, D.1    Ning, P.2
  • 10
    • 0003455038 scopus 로고    scopus 로고
    • Secrecy, authentication, and public key systems,
    • Ph.D. dissertation, Dept. of Electrical Engineering, Stanford Univ
    • R. C. Merkle, "Secrecy, authentication, and public key systems," Ph.D. dissertation, Dept. of Electrical Engineering, Stanford Univ.
    • Merkle, R.C.1
  • 11
    • 34547637204 scopus 로고    scopus 로고
    • Smock: A selfcontained public key management scheme for mission-critical wireless ad hoc networks
    • W. He, Y. Huang, K. Nahrstedt, and W. C. Lee, "Smock: A selfcontained public key management scheme for mission-critical wireless ad hoc networks," Percom, 2007.
    • (2007) Percom
    • He, W.1    Huang, Y.2    Nahrstedt, K.3    Lee, W.C.4
  • 12
    • 74249107792 scopus 로고    scopus 로고
    • The stable marriage problem, and the coupon collectors problem
    • S. Har-Peled, "The stable marriage problem, and the coupon collectors problem," Lecture Notes.
    • Lecture Notes
    • Har-Peled, S.1
  • 14
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Mobile Computing and Networking, 2000, pp. 243-254.
    • (2000) Mobile Computing and Networking , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 15
    • 70350231271 scopus 로고    scopus 로고
    • Rt-link: A time-synchronized link protocol for energy- constrained multi-hop wireless networks
    • R. R. R. Rowe, A. Mangharam, "Rt-link: A time-synchronized link protocol for energy- constrained multi-hop wireless networks," in SECON, 2006.
    • (2006) SECON
    • Rowe, R.R.R.1    Mangharam, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.