Browse > Article

신뢰받는 u-Korea 구현을 위한 무선 정보보호 기술  

Na, Jae-Hun (한국전자통신연구원 정보보호연구단)
Jeong, Gyo-Il (한국전자통신연구원 정보보호연구단)
Son, Seung-Won (한국전자통신연구원 정보보호연구단)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Perrig, J. Stankovic, and D. Wagner, 'Security in Wireless Sensor Networks,' CACM, Vol. 47, No. 6, June 2004
2 A. Perrig, R. Canetti, D.Song and J.F.Tygar, 'Efficient and secure source authentication for multicast,' Network and Distributed System Security Symposium, NDSS' 01, 2001
3 A. Perrig, R. Canetti, J.F.Tygar and D.Song, 'Efficient Authentication and Signing of multicast streams over lossy channels,' IEEE Symposium on Security and Privacy, 2000
4 O. Goldreich, S, Goldwasser and S. Micali, 'How to construct random functions,' Journal of the ACM 33(4), 792-807, 1986   DOI   ScienceOn
5 Y.C. Hu, A. Perrig, D.B. Johnson, 'Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols', In Proc. of 2nd ACM Workshop on Wireless Security(WiSe' 03), 2003
6 ADRIAN PERRIG, ROBERT SZEWCZYK, J.D. TYGAR, VICTOR WEN and DAVID E. CULLER, 'SPINS: Security Protocols for Sensor Networks,' Wireless Networks 8, 521-534, 2002   DOI   ScienceOn
7 J. Deng, R. Han, S. Mishra, 'Security Support In-Network Processing in Wireless Sensor Networks' , In Proc. of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003