1 |
S. Zhu et al, 'LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks', 10th ACM Conference on Com. & Comm. Security, pp. 62-72, 2003
|
2 |
William Stallings, 'Cryptography and Network Security', Pearson, Education, 2003
|
3 |
R.L. Rivest, The RC5 encryption algorithm, in : Workshop on Fast Software Encryption. pp.86-96, 1995
|
4 |
Adrian Perrig et al, 'SPINS : Security Protocols for Sensor Networks', Wireless Networks Journal, 8:521-534, 2002
DOI
ScienceOn
|
5 |
H. Chan, A. Perring and D. Song, 'Random Key Distribution Schemes for Sensor Networks', Proc. IEEE Symposium on Security and Privacy, pp.197-213, May 2003
|
6 |
백선욱, 'Jini 규격에 기반한 댁내 네트워크 시스템의 설계 및 구현', 산업과학연구 제10호, 2000년
|
7 |
W.Du, et al, 'A Pairwise Key Predistribution scheme for Wireless Sensor Network', Proc. 10th ACM Conf. on Computer and Communication Security, pp.42-51, Aug. 2003
|
8 |
한종욱 외 2인, '홈네트워크 보안 기술 동향', 한국통신학회지 제23권 9호, pp.113-124, 2006년
|
9 |
L. Eschenauser and V. Gligor, 'A Key Management Scheme for Distributed Sensor Networks', Proc. 9th ACM Conf. on Computer and Communication Security, pp.41-47, Nov. 2002
|