$\require{mediawiki-texvc}$
  • 검색어에 아래의 연산자를 사용하시면 더 정확한 검색결과를 얻을 수 있습니다.
  • 검색연산자
검색연산자 기능 검색시 예
() 우선순위가 가장 높은 연산자 예1) (나노 (기계 | machine))
공백 두 개의 검색어(식)을 모두 포함하고 있는 문서 검색 예1) (나노 기계)
예2) 나노 장영실
| 두 개의 검색어(식) 중 하나 이상 포함하고 있는 문서 검색 예1) (줄기세포 | 면역)
예2) 줄기세포 | 장영실
! NOT 이후에 있는 검색어가 포함된 문서는 제외 예1) (황금 !백금)
예2) !image
* 검색어의 *란에 0개 이상의 임의의 문자가 포함된 문서 검색 예) semi*
"" 따옴표 내의 구문과 완전히 일치하는 문서만 검색 예) "Transform and Quantization"
쳇봇 이모티콘
안녕하세요!
ScienceON 챗봇입니다.
궁금한 것은 저에게 물어봐주세요.

논문 상세정보

초록이 없습니다.

저자의 다른 논문

참고문헌 (19)

  1. H. Chan, A. Perrig, and D. Song, 'Random Key Predistribution Schemes for Sensor Networks,' In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 197-213, 2003 
  2. L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' In Proceedings of the 9th ACM conference on Computer and communications security, pages 41 - 47, November 18-22 2002 
  3. C. Karlof, and D, Wagner, 'Secure routing in wireless sensor networksL Attacjs abd ciybterneasvres,' In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003 
  4. D. J. Malan, M. Welsh, and M. D. Smith, 'A public - key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,' In Proceedings of The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, October 2004 
  5. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tvsar. 'SPINS: Security protocols for sensor networks,' In Proceedings of ACM International Conference on Mobile Computing and Networks (MobiCom), 2001 
  6. A. Perrig, D. Wagner, and J. Stankovic, 'Security in Wireless Sensor Networks,' In Proceedings of Communications of the ACM, page 53-57, 2004 
  7. MICAz : Wireless Measurement System, http://xbow.com/Products/Products_pdf_files/Wireless_pdf/6020-0060-01 A MICAz.pdf, 2004, Crossbow 
  8. D. Huang, M. Mehta, D. Medhi, and L. Ham, 'Location-aware key management scheme for wireless sensor networks,' In Proceeding of 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, 2004 
  9. 'Key management guideline-workshop document,' draft. Available at http://csrc. nist.gov/encryption/kms/keymanagement-guideline-(workshopt)%.pdf, NIST, 2001 
  10. B.?Doyle, 'S. Bell, A. F. Smeaton, K. McCusker, and N. O'Connor, Security considerations and key negotiation techniques for power constrained sensor networks,' In Proceedings of the Computer Journal (Oxford University Press), vol. 49, no. 4, pages 443-453, 2006 
  11. Telos rev.B : Enabling Ultra-Low Power Wireless Research, http://www.moteiv.com/products/docs/an002-telos.pdf, 2004, tmoteiv 
  12. R. Blom, 'An Optimal Class of Symmetric Key Generation Systems,' In Proceedings of Advances in Cryptology EUROCRYPT' 84, LNCS, vol. 209, Springer- Verlag, pages 335-338, 1985 
  13. W. Du, J. Dang, Y. S. Han, S. Chen, and P. K. Varshney, 'A key management scheme for wireless sensor networks using deployment knowledge,' In Proceedings of IEEE INFOCOM, March 2004 
  14. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, 'A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,' In Proceedings of ACM CCS' 03, 2003 
  15. S. Zhu, S. Setia and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' In Proceedings of the 10th ACM Conference on Computer and Communication Security, pages 62-72, 2003 
  16. Intel Mote2 Overview, http://www.intel.com/research/downloads/imote_overview.pdf, 2005, intel-research 
  17. Fei Hu, Jason Tillet, Jim Ziobro, and Neeraj K. Sharma, 'Secure Wireless Sensor Networks: Problems and Solutions,' Journal on Systemics, Cybernetics and Informatics (Best Paper Award), Vol.1, No.9, 2004 
  18. 'TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 0.1),' Available at http://discovery.csc.ncsu.edu/software/TinyECC/, North Carolina State University 
  19. David E. Culler, 'Wireless Sensor Networks - the Next IT Revolution,' KES 2004, Oct 7, 2004 

이 논문을 인용한 문헌 (1)

  1. Mun, Seong-Mi ; Son, Joo-Young 2009. "A Study on Secure Routing for a Maritime Network Based on Mobile Multi-hop Wireless Networks" 한국마린엔지니어링학회지 = Journal of the Korean Society of Marine Engineering, 33(1): 120~130 

원문보기

원문 PDF 다운로드

  • ScienceON :

원문 URL 링크

원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다. (원문복사서비스 안내 바로 가기)

상세조회 0건 원문조회 0건

DOI 인용 스타일