메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Energy efficiency in M2M networks: A cooperative key establishment system

Author keywords

cooperation; energy efficiency; key establishment; M2M; resource constraints; trust

Indexed keywords

COOPERATION; KEY ESTABLISHMENTS; M2M; RESOURCE CONSTRAINT; TRUST;

EID: 84856171505     PISSN: 21570221     EISSN: 2157023X     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (30)
  • 12
    • 33750904440 scopus 로고    scopus 로고
    • Unleashing public-key cryptography in wireless sensor networks
    • On IWAP'05
    • J. Lopez, "Unleashing public-key cryptography in wireless sensor networks," Journal of Computer Security, vol. 14, no. 5, pp. 469-482, 2006. (Pubitemid 44728272)
    • (2006) Journal of Computer Security , vol.14 , Issue.5 , pp. 469-482
    • Lopez, J.1
  • 13
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • N. R. Potlapally, S. Ravi, A. Raghunathan, N.K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," IEEE Transactions on Mobile Computing 5 (2) (2006) 128-143. (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 18
    • 0017930809 scopus 로고
    • METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
    • DOI 10.1145/359340.359342
    • R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp 120-126, February 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 20
    • 23944459661 scopus 로고    scopus 로고
    • Public key cryptography in sensor networks-revisited
    • Security in Ad-hoc and Sensor Networks - First European Workshop, ESAS 2004
    • G. Gaubatz, J. Kaps, and B. Sunar, "Public key cryptography in sensor networks-revisited," Lecture Notes in Computer Science, vol. 3313, pp. 2-18, 2005. (Pubitemid 41190913)
    • (2005) Lecture Notes in Computer Science , vol.3313 , pp. 2-18
    • Gaubatz, G.1    Kaps, J.-P.2    Sunar, B.3
  • 27
    • 56949106654 scopus 로고    scopus 로고
    • A unified security framework with three key management schemes for wireless sensor networks
    • R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Farooq Ahmed, "A unified security framework with three key management schemes for wireless sensor networks," Computer Communications, vol. 31, no. 18, pp. 4269-4280, 2008.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4269-4280
    • Riaz, R.1    Naureen, A.2    Akram, A.3    Akbar, A.4    Kim, K.5    Farooq Ahmed, H.6
  • 28
    • 0002474948 scopus 로고    scopus 로고
    • Performance comparison of public-key cryptosystems
    • M. J. Wiener, "Performance comparison of public-key cryptosystems,"RSA Laboratories'CryptoBytes, vol. 4, no. 1, pp. 1+3-5, 1998.
    • (1998) RSA Laboratories'CryptoBytes , vol.4 , Issue.1
    • Wiener, M.J.1
  • 30
    • 84947431932 scopus 로고    scopus 로고
    • Better than BiBa: Short one-time signatures with fast signing and verifying
    • Proceedings of the 7th Australian Conference on Information Security and Privacy, ser. J. Seberry, Ed., Springer
    • L. Reyzin and N. Reyzin, "Better than BiBa: Short one-time signatures with fast signing and verifying," in Proceedings of the 7th Australian Conference on Information Security and Privacy, ser. Lecture Notes in Computer Science, J. Seberry, Ed., vol. 2384. Springer, 2002, pp. 144-153.
    • (2002) Lecture Notes in Computer Science , vol.2384 , pp. 144-153
    • Reyzin, L.1    Reyzin, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.