메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 586-597

A key management scheme for wireless sensor networks using deployment knowledge

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE; COMPUTER NETWORKS; DATA STORAGE EQUIPMENT; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 8344262333     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (773)

References (24)
  • 2
    • 0842283130 scopus 로고    scopus 로고
    • University of California, Available
    • Wireless Integrated Network Sensors, University of California, Available: http://www.janet.ucla.edu/WINS.
    • Wireless Integrated Network Sensors
  • 4
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. C. Neuman and T. Tso, "Kerberos: An authentication service for computer networks,'" IEEE Communications, vol. 32, no. 9, pp. 33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Tso, T.2
  • 6
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 10
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, California, May 11-14
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14 2003, pp. 197-213.
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 14
    • 84969340391 scopus 로고
    • Key distribution protocol for digital mobile communication systems
    • INCS, Springer-verlag
    • M. Tatebayashi, N. Matsuzaki, and D. B. Newman, "Key distribution protocol for digital mobile communication systems," Advances in Cryptology - CRYPTO'89, pp. 324-334, 1989, INCS Volume 435, Springer-verlag.
    • (1989) Advances in Cryptology - CRYPTO'89 , vol.435 , pp. 324-334
    • Tatebayashi, M.1    Matsuzaki, N.2    Newman, D.B.3
  • 15
    • 84969354234 scopus 로고
    • On key distribution and authentication in mobile radio networks
    • INCS, Springer-verlag
    • C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, "On key distribution and authentication in mobile radio networks," Advances in Cryptology - EuroCrypt'93, pp. 461-465, 1993, INCS Volume 765, Springer-verlag.
    • (1993) Advances in Cryptology - EuroCrypt'93 , vol.765 , pp. 461-465
    • Park, C.1    Kurosawa, K.2    Okamoto, T.3    Tsujii, S.4
  • 16
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • M. Beller and Y. Yacobi, "Fully-fledged two-way public key authentication and key agreement for low-cost terminals," Electronics Letters, vol. 29, no. 11, pp. 999-1001, 1993.
    • (1993) Electronics Letters , vol.29 , Issue.11 , pp. 999-1001
    • Beller, M.1    Yacobi, Y.2
  • 17
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey," Lecture Notes in Computer Science, vol. 1438, pp. 344-355, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 18
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 20
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • 1NCS Volume 1796, Springer-verlag
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in 7th International Workshop on Security Protocols, vol. 1796, 1999, pp. 172-194, 1NCS Volume 1796, Springer-verlag.
    • (1999) 7th International Workshop on Security Protocols , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 23
    • 0001540595 scopus 로고
    • On random graphs I
    • Erdõs and Rényi, "On random graphs I," Publ. Math. Debrecen, vol. 6, pp. 290-297, 1959.
    • (1959) Publ. Math. Debrecen , vol.6 , pp. 290-297
    • Erdõs1    Rényi2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.