메뉴 건너뛰기




Volumn 4357 LNCS, Issue , 2006, Pages 18-31

Re-visited: Denial of service resilient access control for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISM; ACCESS CONTROL PROTOCOL; AGRICULTURE SECTORS; BATTERY CAPACITY; DENIAL OF SERVICE; OVERALL BENEFIT; PROFESSIONAL ACTIVITIES; WSN APPLICATIONS;

EID: 84876403419     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11964254_4     Document Type: Conference Paper
Times cited : (2)

References (19)
  • 4
    • 84876390013 scopus 로고    scopus 로고
    • FIPS PUB 140-2, Federal Information Processing Standards Publication, National Institute of Standards and Technology
    • FIPS PUB 140-2, "Security Requirements for Cryptographic Modules", Federal Information Processing Standards Publication, National Institute of Standards and Technology.
    • Security Requirements for Cryptographic Modules
  • 7
    • 3142692234 scopus 로고    scopus 로고
    • Beyond average: Towards sophisticated sensing with queries
    • Palo Alto, CA, USA, April
    • J. M. Hellerstein, W. Hong, S.Madden, K. Stanek, "Beyond Average: Towards Sophisticated Sensing with Queries", In Workshop on IPSN'03, Palo Alto, CA, USA, April 2003.
    • (2003) Workshop on IPSN'03
    • Hellerstein, J.M.1    Hong, W.2    Madden, S.3    Stanek, K.4
  • 9
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • ACM Press, New York, NY, USA
    • L. Lamport, "Password authentication with insecure communication", Commun. ACM 24(11), pp. 770-772, ACM Press, New York, NY, USA, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 12
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad hoc wireless networks
    • volume 1796 of Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany
    • F. Stajano, R. Anderson, "The resurrecting duckling: Security issues for ad hoc wireless networks", 7th International Workshop, volume 1796 of Lecture Notes in Computer Science, pp. 172-194. Springer-Verlag, Berlin Germany, 2000.
    • (2000) 7th International Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 14
    • 24144433244 scopus 로고    scopus 로고
    • Zero-common knowldge authentication for pervasive networks
    • Springer-Verlag LNCS 3006, Ottawa, Ontario, CA, August
    • A. Weimerskirch, D. Westhoff, "Zero-Common Knowldge Authentication for Pervasive Networks", 10th Selected Areas in Cryptography, SAC'03, Springer-Verlag LNCS 3006, pp. 73-87, Ottawa, Ontario, CA, August 2003.
    • (2003) 10th Selected Areas in Cryptography, SAC'03 , pp. 73-87
    • Weimerskirch, A.1    Westhoff, D.2
  • 15
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in wireless sensor networks: Encryption, key pre-distribution and routing
    • October
    • D. Westhoff, J. Girao, M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-distribution and Routing", in IEEE Transactions on Mobile Comuting, Vol. 10, October 2006.
    • (2006) IEEE Transactions on Mobile Comuting , vol.10
    • Westhoff, D.1    Girao, J.2    Acharya, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.