메뉴 건너뛰기




Volumn 278, Issue , 2010, Pages 77-107

Secure data aggregation in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77956306213     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-13965-9_3     Document Type: Article
Times cited : (8)

References (35)
  • 4
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
    • Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1989)
    • (1989) LNCS , vol.435 , pp. 218-238
    • Merkle, R.1
  • 7
    • 38149043296 scopus 로고    scopus 로고
    • A secure data aggregation scheme for wireless sensor networks
    • Ren, S.Q., Kim, D.S., Park, J.S.: A Secure Data Aggregation Scheme for Wireless sensor Networks. In: ISPA Workshops 2007, pp. 32-40 (2007)
    • (2007) ISPA Workshops 2007 , pp. 32-40
    • Ren, S.Q.1    Kim, D.S.2    Park, J.S.3
  • 13
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • doi:10.1016/j.comnet.2009.02.023
    • Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. In: Computer Networks (2009), doi:10.1016/j.comnet.2009.02.023
    • (2009) Computer Networks
    • Ozdemir, S.1    Xiao, Y.2
  • 14
    • 33845747795 scopus 로고    scopus 로고
    • A secure hierarchical in-network aggregation in sensor networks
    • Chan, H., Perrig, A., Song, D.: A Secure Hierarchical In-network Aggregation in Sensor Networks. In: CCS 2006 (2006)
    • (2006) CCS 2006
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 17
    • 1542280027 scopus 로고    scopus 로고
    • Query processing for sensor networks
    • Yao, Y., Gehrke, J.: Query Processing for Sensor Networks. In: ACM CIDR (2003)
    • (2003) ACM CIDR
    • Yao, Y.1    Gehrke, J.2
  • 22
    • 35048871887 scopus 로고    scopus 로고
    • Using secret sharing for searching in encrypted data
    • Jonker, W., Petkovi, M. (eds.) SDM 2004. Springer, Heidelberg
    • Jonker, W., Petkovic, M.: Using secret sharing for searching in encrypted data. In: Jonker, W., Petkovi, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 18-27. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3178 , pp. 18-27
    • Jonker, W.1    Petkovic, M.2
  • 24
    • 43849098907 scopus 로고    scopus 로고
    • A trust based framework for secure data aggregation in wireless sensor networks
    • Zhang, W., Das, S.K., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: IEEE SECON 2006 proceedings (2006)
    • (2006) IEEE SECON 2006 Proceedings
    • Zhang, W.1    Das, S.K.2    Liu, Y.3
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 26
  • 28
    • 33749525209 scopus 로고    scopus 로고
    • Efficient aggregation of encrypted data in wireless sensor networks
    • Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. In: MobiQuitous 2005 (2005)
    • (2005) MobiQuitous 2005
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 30
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM 21 (1978)
    • (1978) Communications of the ACM , vol.21
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 31
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 32
    • 27644505653 scopus 로고    scopus 로고
    • Lightweight key management in wireless sensornetworks by leveraging initial trust
    • System Design Laboratory
    • Dutertre, B., Cheung, S., Levy, J.: Lightweight key management in wireless sensornetworks by leveraging initial trust. T.R SRI-SDL-04-02, System Design Laboratory (2004)
    • (2004) T.R SRI-SDL-04-02
    • Dutertre, B.1    Cheung, S.2    Levy, J.3
  • 33
    • 85028765277 scopus 로고
    • Perfectlysecure key distribution for dynamic conferences
    • Brickell E.F. (ed.) CRYPTO 1992. . Springer, Heidelberg
    • Blundo, C., Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectlysecure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO1992. LNCS, vol. 740, pp. 471-486. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 471-486
    • Blundo, C.1    Santis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.