메뉴 건너뛰기




Volumn 6, Issue 1, 2009, Pages

ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

Author keywords

Communication; Public key; Sensor networks

Indexed keywords

BASIC IDEA; BROADCAST AUTHENTICATION; ENERGY CONSTRAINT; ENERGY CONSUMPTION; KEY DISTRIBUTION SCHEMES; PUBLIC KEY; PUBLIC KEY SCHEMES; PUBLIC KEYS; REAL TIME REQUIREMENT; RECENT TRENDS; SHORT PERIODS; SYMMETRIC KEYS;

EID: 75149140941     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1653760.1653769     Document Type: Article
Times cited : (25)

References (41)
  • 1
    • 84966219173 scopus 로고
    • Elliptic curves and primality proving
    • ATKIN, A. O. L. ANDMORAIN, F. 1993. Elliptic curves and primality proving. Math. Comput. 29-67.
    • (1993) Math. Comput. , pp. 29-67
    • Atkin, A.O.L.1    Morain, F.2
  • 3
    • 84957672468 scopus 로고    scopus 로고
    • Cryptanalysis of RSA with private key d less than N0.292
    • BONEH,D. ANDDURFEE,G. 1999. Cryptanalysis of RSA with private key d less than N0.292. Lecture Notes in Computer Science, vol.1592, 1-9.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 1-9
    • Boneh, D.1    Durfee, G.2
  • 6
    • 13944281653 scopus 로고    scopus 로고
    • Tsync: A lightweight bidirectional time synchronization service for wireless sensor networks
    • DAI, H. AND HAN, R. 2004. Tsync: A lightweight bidirectional time synchronization service for wireless sensor networks. ACM SIGMOBILE Mobile Comput. Comm. Rev. 8, 1, 125-139.
    • (2004) ACM SIGMOBILE Mobile Comput. Comm. Rev. , vol.8 , Issue.1 , pp. 125-139
    • Dai, H.1    Han, R.2
  • 9
    • 17844362127 scopus 로고    scopus 로고
    • How to sign digital streams
    • T.J.Watson Research Center
    • GENNARO, R. AND ROHATGI, P. 1997. How to sign digital streams. Tech. rep. IBM T.J.Watson Research Center.
    • (1997) Tech. Rep. IBM
    • Gennaro, R.1    Rohatgi, P.2
  • 16
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • LUBY, M. AND RACKOFF, C. 1988. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17, 2, 373-386.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 17
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • MENEZES, A., OKAMOTO, T., AND VANSTONE, A. 1993. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory 39, 5, 1639-1646.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, A.3
  • 20
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudorandom permutations: Luby-Rackoff revisited
    • NAOR, M. AND REINGOLD, O. 1999. On the construction of pseudorandom permutations: Luby-Rackoff revisited. J. Cryptol. J. Int. Assoc. Cryptol. Res. 12, 1, 29-66.
    • (1999) J. Cryptol. J. Int. Assoc. Cryptol. Res. , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 21
    • 70449096014 scopus 로고    scopus 로고
    • Cyber Defense Lab, North Carolina State University
    • NING, P. 2006. Tinyecc: Elliptic curve cryptography for sensor networks. Cyber Defense Lab, North Carolina State University. http://discovery.csc.ncsu. edu/pning/software/TinyECC/index.html.
    • (2006) Tinyecc: Elliptic Curve Cryptography for Sensor Networks
    • Ning, P.1
  • 26
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation (mod p)
    • POLLARD, J. M. 1978. Monte Carlo methods for index computation (mod p). Math. Comput. 32, 143, 918-924.
    • (1978) Math. Comput. , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.M.1
  • 32
    • 0038443119 scopus 로고    scopus 로고
    • Next generation security for wireless: Elliptic curve cryptography
    • VANSTONE, S. 2003. Next generation security for wireless: Elliptic curve cryptography. Comput. Secur. 22, 5, 412-459.
    • (2003) Comput. Secur. , vol.22 , Issue.5 , pp. 412-459
    • Vanstone, S.1
  • 38
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • WIENER, M. 1990. Cryptanalysis of short RSA secret exponents. IEEE Trans. Inform. Theory 36, 553-558.
    • (1990) IEEE Trans. Inform. Theory , vol.36 , pp. 553-558
    • Wiener, M.1
  • 41
    • 17444382005 scopus 로고    scopus 로고
    • Energy-Balanced task allocation for collaborative processing in wireless sensor networks
    • YU, Y. AND PRANSANNA, V. 2005. Energy-Balanced task allocation for collaborative processing In wireless sensor networks. Mobile Netw. Appl. 10, 115-131.
    • (2005) Mobile Netw. Appl. , vol.10 , pp. 115-131
    • Yu, Y.1    Pransanna, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.