메뉴 건너뛰기




Volumn , Issue , 2011, Pages 175-182

Secure random number generation in wireless sensor networks

Author keywords

leader election; random numbers generation; wireless sensor networks

Indexed keywords

EXPERIMENTAL EVALUATION; GENERATION PROCESS; LEADER ELECTION; PHYSICAL ENVIRONMENTS; PHYSICAL MEASUREMENT; RANDOM NUMBERS; RANDOM SOURCES; REAL-WORLD SCENARIO; SECURITY ALGORITHM; SECURITY ATTACKS; WIRELESS SENSOR; WIRELESS SENSOR NODE;

EID: 83455245044     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2070425.2070453     Document Type: Conference Paper
Times cited : (14)

References (20)
  • 3
    • 0018465825 scopus 로고
    • IMPROVED ALGORITHM FOR DECENTRALIZED EXTREMA-FINDING IN CIRCULAR CONFIGURATIONS OF PROCESSES.
    • DOI 10.1145/359104.359108
    • E. Chang and R. Roberts. An improved algorithm for decentralized extrema-finding in circular configurations of processes. Communications of the ACM, 22(5):281-283, 1979. (Pubitemid 9461372)
    • (1979) Commun ACM , vol.22 , Issue.5 , pp. 281-283
    • Chang, E.1    Roberts, R.2
  • 4
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • W. Diffie and M. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, 1979.
    • (1979) Proceedings of the IEEE , vol.67 , Issue.3 , pp. 397-427
    • Diffie, W.1    Hellman, M.2
  • 9
    • 84976712802 scopus 로고
    • Decentralized extrema-finding in circular configurations of processors
    • D. Hirschberg and J. Sinclair. Decentralized extrema-finding in circular configurations of processors. Communications of the ACM, 23(11):627-628, 1980.
    • (1980) Communications of the ACM , vol.23 , Issue.11 , pp. 627-628
    • Hirschberg, D.1    Sinclair, J.2
  • 12
    • 0017722619 scopus 로고
    • Distributed systems, towards a formal approach
    • G. Le Lann. Distributed systems, towards a formal approach. Information processing, 77:155-160, 1977.
    • (1977) Information Processing , vol.77 , pp. 155-160
    • Le Lann, G.1
  • 16
    • 0018683804 scopus 로고
    • Encryption and secure computer networks
    • G. Popek and C. Kline. Encryption and secure computer networks. ACM Computing Surveys (CSUR), 11(4):331-356, 1979.
    • (1979) ACM Computing Surveys (CSUR) , vol.11 , Issue.4 , pp. 331-356
    • Popek, G.1    Kline, C.2
  • 17
    • 0004007880 scopus 로고
    • E. Corporation. Wiley Online Library
    • B. Ripley and E. Corporation. Stochastic simulation, volume 21. Wiley Online Library, 1987.
    • (1987) Stochastic Simulation , vol.21
    • Ripley, B.1
  • 18
    • 85008060937 scopus 로고    scopus 로고
    • A provably secure true random number generator with built-in tolerance to active attacks
    • B. Sunar, W. Martin, and D. Stinson. A provably secure true random number generator with built-in tolerance to active attacks. IEEE Transactions on computers, pages 109-119, 2007.
    • (2007) IEEE Transactions on Computers , pp. 109-119
    • Sunar, B.1    Martin, W.2    Stinson, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.