1 |
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security :A Taxonomy and some Efficient Constructions", In Proc. IEEE Infocom, 1999.
|
2 |
Y. Wang, B. Ramamurthy, and X. Zou, "The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks", Proc. IEEE ICC, 2006.
|
3 |
이성민, 노봉수, 김제호, "감시정찰 센서네트워크의 군전술통신망 연동", 국방과학연구소, 2007.
|
4 |
L. Eschenauer and V. D. Gligor, "A key management scheme for distributed sensor networks", in Proc. 9th ACM conference on CCS, 2002.
|
5 |
D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks", Proc. 10th ACM Conf. Computer and Comm. Security( CCS), pp. 52-61, 2003.
|
6 |
W. Du, Jing Deng, Y. S. Han, and P. Varshney, "A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge", IEEE Transactions On Dependable and Secure Computing, Vol. 3, 2006.
|
7 |
Y. Kim, A. Perring, and G. Tsudik, "Simple and Fault-tolerant Key Agreement for Dynamic Collaborative Groups", In ACM CCS, 2000.
|
8 |
권미영, 이노복, 김용현, "무선 센서네트워크 보안 정책 및 프로파일 연구", 국방과학연구소, 2009.
|
9 |
김용현, 이노복, "감시정찰 센서네트워크 개발구축 방향", 국방과학연구소, 2007.
|