메뉴 건너뛰기




Volumn 7, Issue 1, 2010, Pages

Toward trusted wireless sensor Networks

Author keywords

Public key (PK); Remote attestation; RSA; TPM; Trusted computing; Wireless sensor Networks

Indexed keywords

PUBLIC KEYS; REMOTE ATTESTATION; RSA; TPM; TRUSTED COMPUTING; WIRELESS SENSOR;

EID: 77956128351     PISSN: 15504859     EISSN: 15504867     Source Type: Journal    
DOI: 10.1145/1806895.1806900     Document Type: Article
Times cited : (54)

References (34)
  • 7
    • 0031351746 scopus 로고    scopus 로고
    • New directions in cryptography: Twenty some years later (or cryptograpy and complexity theory: a match made in heaven)
    • IEEE Computer Society Press, Los Alamitos, CA
    • GOLDWASSER, S. 1997. New directions in cryptography: Twenty some years later (or cryptograpy and complexity theory: a match made in heaven). In Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society Press, Los Alamitos, CA, 314.
    • (1997) Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS) , pp. 314
    • Goldwasser, S.1
  • 8
    • 77956131733 scopus 로고    scopus 로고
    • Exploiting wireless sensor networks over 802.15.4
    • GOODSPEED, T. 2007. Exploiting wireless sensor networks over 802.15.4. In Proceedings of Toor-Conq.
    • (2007) Proceedings of Toor-Conq
    • Goodspeed, T.1
  • 9
    • 35048818581 scopus 로고    scopus 로고
    • Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUS
    • Springer, Berlin, Germany
    • GURN, N., PATEL, A., WANDER, A., EBERLE, H., AND SHANTZ, S. C. 2004. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUS. Lecture Notes in Computer Science vol. 3156. Springer, Berlin, Germany, 119-132.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 119-132
    • Gurn, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 10
    • 33745639957 scopus 로고    scopus 로고
    • Node compromise in sensor networks: The need for secure systems
    • University of Colorado at Boulder. Boulder, CO
    • HARTUNG, C., BALASALLE, J., AND HAN, R. 2005. Node compromise in sensor networks: The need for secure systems. Tech. rep. University of Colorado at Boulder. Boulder, CO.
    • (2005) Tech. Rep.
    • Hartung, C.1    Balasalle, J.2    Han, R.3
  • 11
    • 85034631664 scopus 로고
    • On using RSA with low exponent in a public key network
    • Lecture Notes in Computer Science, Springer-Verlag, New York, NY
    • HASTAD, J. 1986. On using RSA with low exponent in a public key network. In Proceedings of the Advances in cryptology-(CRYPTO'85). Lecture Notes in Computer Science, vol. 218 Springer-Verlag, New York, NY, 403-408.
    • (1986) Proceedings of the Advances in Cryptology-(CRYPTO'85) , vol.218 , pp. 403-408
    • Hastad, J.1
  • 12
    • 0036870095 scopus 로고    scopus 로고
    • Mica: A wireless platform for deeply embedded networks
    • HILL, J. AND CULLER, D. 2002. Mica: A wireless platform for deeply embedded networks. IEEE Micro 22, 6, 12-24.
    • (2002) IEEE Micro , vol.22 , Issue.6 , pp. 12-24
    • Hill, J.1    Culler, D.2
  • 18
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • IEEE Computer Society Press, Los Alamitos, CA
    • LIU, A. AND NING, P. 2008. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN). IEEE Computer Society Press, Los Alamitos, CA, 245-256.
    • (2008) Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN) , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 21
    • 15744395962 scopus 로고    scopus 로고
    • TEA extensions
    • University of Cambridge, Cambridge, UK
    • NEEDHAM, R. AND WHEELER, D. 1997. TEA extensions. Tech. rep., University of Cambridge, Cambridge, UK.
    • (1997) Tech. rep.
    • Needham, R.1    Wheeler, D.2
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2, 120-126.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 27
    • 20844460401 scopus 로고    scopus 로고
    • On the cost of factoring RSA-1024
    • SHAMIR, A. AND TROMER, E. 2003. On the cost of factoring RSA-1024. RSA CrytoBytes. 6, 2.
    • (2003) RSA CrytoBytes , vol.6 , Issue.2
    • Shamir, A.1    Tromer, E.2
  • 32
    • 21644486314 scopus 로고    scopus 로고
    • TCG specification architecture overview
    • T CG, Trust Computing Group. Trusted Computer Group, Beaventon, OR
    • T CG. 2007. TCG specification architecture overview. Tech. rep. Trust Computing Group. Trusted Computer Group, Beaventon, OR.
    • (2007) Tech. Rep.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.