메뉴 건너뛰기




Volumn , Issue , 2009, Pages 168-172

An authentication protocol for sensor networks using pairings

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; CRITICAL FACTORS; NEW APPLICATIONS;

EID: 77950168413     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CONIELECOMP.2009.14     Document Type: Conference Paper
Times cited : (1)

References (34)
  • 1
    • 35048867517 scopus 로고    scopus 로고
    • Camtepe, Yener, Combinational Design of Key Distribution Mechanisms for Wireless Sensor Networks, LNCS 3193 ESORICS'04 2004.
    • Camtepe, Yener, Combinational Design of Key Distribution Mechanisms for Wireless Sensor Networks, LNCS 3193 ESORICS'04 2004.
  • 2
    • 63749114135 scopus 로고    scopus 로고
    • A Survey of Identity-Based Cryptography
    • Baek, Newmarch, Safavi-Naini Susilo, A Survey of Identity-Based Cryptography, In Proc. of the 10th AUUG 2004, pp. 95-102.
    • Proc. of the 10th , vol.AUUG 2004 , pp. 95-102
    • Baek, N.1    Susilo, S.-N.2
  • 3
    • 77950169459 scopus 로고    scopus 로고
    • Random Key Predistribution Schemes for Sensor Networks
    • Chan, Perring, Song, Random Key Predistribution Schemes for Sensor Networks, IEEE S&P'03 2003
    • (2003) IEEE S&P'03
    • Chan1    Perring2    Song3
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Boneh, Franklin: Identity-Based Encryption from the Weil Pairing, In Proceedings of CRYPTO 2001, pp 213-229.
    • (2001) Proceedings of CRYPTO , pp. 213-229
    • Boneh, F.1
  • 5
    • 11144302585 scopus 로고    scopus 로고
    • Wireless Sensor Networks
    • Culler, Hong, Wireless Sensor Networks, Communications of ACM, Vol. 47 No. 6, 2004
    • (2004) Communications of ACM , vol.47 , Issue.6
    • Hong, C.1
  • 6
    • 77950112592 scopus 로고    scopus 로고
    • Di Pietro, Mancini, Mei, Random Key-Assignment for Secure Wireless Sensor Networks, ACM SANS'03 2003
    • Di Pietro, Mancini, Mei, Random Key-Assignment for Secure Wireless Sensor Networks, ACM SANS'03 2003
  • 9
    • 27244454348 scopus 로고    scopus 로고
    • Pairing-based cryptographic protocols: A survey. Cryptology ePrint Archive
    • Report 2004/064
    • Dutta, Barua, Sarkar, Pairing-based cryptographic protocols: A survey. Cryptology ePrint Archive, Report 2004/064 (2004)
    • (2004)
    • Dutta1    Barua2    Sarkar3
  • 12
    • 77950159185 scopus 로고    scopus 로고
    • Hu, Ziobro, Tillet, Sharma, Secure Wireless Sensor Networks: Problems and Solutions, Journal of Systemic, Cybernetics and Informatics, 1 No. 3
    • Hu, Ziobro, Tillet, Sharma, Secure Wireless Sensor Networks: Problems and Solutions, Journal of Systemic, Cybernetics and Informatics, Vol 1 No. 3
  • 14
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor
    • Liu, Ning: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008, pp 245-256
    • Networks , vol.IPSN 2008 , pp. 245-256
    • Liu, N.1
  • 15
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, Vol. 48, 1987, 203-209..
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz1
  • 16
    • 77950154551 scopus 로고    scopus 로고
    • Li, Ling, Znati, Wu, A Robust On-Demand Path-Key Establishment Framework Via Random Key Predistribution For Wireless Sensor Networks, EURASIP Journal On Communications And Networking 2006 Art id 91304
    • Li, Ling, Znati, Wu, A Robust On-Demand Path-Key Establishment Framework Via Random Key Predistribution For Wireless Sensor Networks, EURASIP Journal On Communications And Networking Vol. 2006 Art id 91304
  • 18
    • 24944490424 scopus 로고    scopus 로고
    • Welsh, Smith, A Public-Key Infrastructure for Key Distribution in TinyOS Based On Elliptic Curve Cryptography
    • Malan, Welsh, Smith, A Public-Key Infrastructure for Key Distribution in TinyOS Based On Elliptic Curve Cryptography, IEEE SECON'04 2004
    • (2004) IEEE SECON'04
    • Malan1
  • 22
    • 34547420699 scopus 로고    scopus 로고
    • How Public Key Cryptography Influences Wireless Sensor Node Lifetime
    • Piotrowsi, Langendoerfer, Peter, How Public Key Cryptography Influences Wireless Sensor Node Lifetime, ACM SANS 2006.
    • (2006) ACM SANS
    • Piotrowsi1    Langendoerfer2    Peter3
  • 23
    • 27744448961 scopus 로고    scopus 로고
    • Puccinelli, Haenggi, Wireless Sensor Networks: Applications and Challenges of Ubiquitous Sensing, IEEE Circuits and System Magazine 3rd Q. 2005.
    • Puccinelli, Haenggi, Wireless Sensor Networks: Applications and Challenges of Ubiquitous Sensing, IEEE Circuits and System Magazine 3rd Q. 2005.
  • 24
    • 33646581008 scopus 로고    scopus 로고
    • Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
    • Wander, Gura, Eberle, Gupta and Shantz, Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, In Proceedings of the IEEE PERCOM, 2005 pp 324-328.
    • (2005) Proceedings of the IEEE PERCOM , pp. 324-328
    • Wander, G.1    Eberle, G.2    Shantz3
  • 25
    • 77950154550 scopus 로고    scopus 로고
    • Elliptic Curves, Number Theory and Crpytography
    • Second Edition
    • Washington, Elliptic Curves, Number Theory and Crpytography, Second Edition, Chapman & Hall / CRC, 2005.
    • (2005) Chapman & Hall / CRC
    • Washington1
  • 27
    • 0036688074 scopus 로고    scopus 로고
    • A Survey on Sensor Networks
    • August
    • Su, Sankarasubramaniam, et al, A Survey on Sensor Networks, IEEE Communications Magazine August 2002
    • (2002) IEEE Communications Magazine
    • Su, S.1
  • 28
    • 27244454939 scopus 로고    scopus 로고
    • Efficient pairing computation on supersingular Abelian varieties
    • IACR Eprint Archive Report 2004-375
    • Barreto, Galbraith, Heigeartaigh, Scott, Efficient pairing computation on supersingular Abelian varieties, IACR Eprint Archive Report 2004-375.
    • Barreto, G.1    Heigeartaigh, S.2
  • 29
    • 77950170402 scopus 로고    scopus 로고
    • Hess, Smart, Vercauteren, The Eta Pairing Revisited, IEEE Transactions on Information Theory, No. 10, 2006, pp 4595-4602
    • Hess, Smart, Vercauteren, The Eta Pairing Revisited, IEEE Transactions on Information Theory, Vol. No. 10, 2006, pp 4595-4602
  • 30
    • 77950100667 scopus 로고    scopus 로고
    • Tinypk: Securing Sensor Networks With Public Key Technology
    • Watro, Kong, Cuti, Gardiner, Lynn, Kruss, Tinypk: Securing Sensor Networks With Public Key Technology, ACM SANS'04 2004.
    • (2004) ACM SANS'04
    • Kong, W.1    Cuti, G.2    Lynn, K.3
  • 31
    • 35248867510 scopus 로고    scopus 로고
    • Efficient Identity Based Signature Schemes Based on Pairings, Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
    • Hess, Efficient Identity Based Signature Schemes Based on Pairings, Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography LNCS 2595, 2002, pp 310-324.
    • (2002) LNCS , vol.2595 , pp. 310-324
    • Hess1
  • 33
    • 0001827537 scopus 로고
    • Identity-Based Cryptosystems and Signature Schemes
    • Shamir, Identity-Based Cryptosystems and Signature Schemes. In Proceedings of CRYPTO 1984: pp 47-53
    • (1984) Proceedings of CRYPTO , pp. 47-53
    • Shamir1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.