Browse > Article

유비쿼터스 환경과 보안  

김형중 (강원대학교 제어계측공학과)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A, Abdul-Rahman, and S. Hailes, 'A Disthbuted Trust Model,' ACM New Security Paradigm Workshop, pp. 48-60, 1997
2 J.-P. Hubaux, L. Buttyn, and S. Apkun. 'The Quest for Security in Mobile Ad HocNetworks,' ACM Symposium on MobileAd Hoc Networking and Computing, 2001
3 F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons, 2002
4 F. Stajano, and R. Anderson, 'The Cocaine Auction Protocol: On the Power of Anonymous Broadcast,' Lecture Notes in Computer Science, vol. 1768, pp. 434-447, 1999
5 K. Wrona, 'Distributed Security: Ad-Hoc Networks and Beyond. Workshop on Requirements for Mobile Privacy and Security, 2002
6 L. Zhou, and Z. H. Haas, 'Securing Ad Hoc Networks,' IEEE Network Magazine, vol. 13, no. 6, 1999
7 F. Stajano, 'The Resurrecting Duckling What Next?,' Lecture Notes in Computer Science, vol. 2133, pp. 204-214, 2000
8 F. Stajano, and R. Anderson, 'The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks,' Lecture Notes in Computer Science, vol. 1796, pp. 172-182, 1999
9 A. Weimerskirch, and G. Thonet, 'A Distributed Light-Weight Authentication Model for Ad-Hoc Networks,' Lecture Notes in Computer Science, vol. 2288, pp. 341-354, 2001
10 U. Carlsen, 'Optimal Privacy and Authentication on a Portable Communication Systern,' Operating Systems Review, vol. 28, no. 3, pp. 16-23, 1994   DOI   ScienceOn
11 N. Asokan, and P. Ginzboorg, 'Key Agreement in Ad Hoc Networks,' Computer Communications, vol. 23, pp. 1627-1637, 2000   DOI   ScienceOn
12 D. Chaum, 'The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability,' Journal of Cryptology, vol. 1, no. 1, pp. 65-75, 1988
13 J. M. Kahn, R. H. Katz, and K. S Pister, 'Next Century Challenges:Mobile Net-working for 'SmartDust',' International Conference on Mobile Computing and Networking,1999
14 S. Marti, T. J. Giuli, K. Lai, and M. Baker, 'Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,' Mobile Computing and Networking, pp. 255-265, 2000