This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n16http://localhost/temp/predkladatel/
n10http://purl.org/net/nknouf/ns/bibtex#
n15http://linked.opendata.cz/resource/domain/vavai/projekt/
n12http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n11http://linked.opendata.cz/ontology/domain/vavai/
n13https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n21http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F14%3A00073940%21RIV15-MSM-14330___/
n19http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n18http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n6http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n22http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n9http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F14%3A00073940%21RIV15-MSM-14330___
rdf:type
skos:Concept n11:Vysledek
dcterms:description
Usage of various key (pre-)distribution schemes (KDSs) in networks with an active attacker results in a partially compromised network where some fraction of keys used to protect link communication is known to the attacker. The secrecy amplification protocols were proposed to secure again some previously compromised communication links by using non-compromised paths to deliver new secure keys. Design of suitable secrecy amplification protocols remains a challenge in scenarios where a trade-off between necessary resources (e.g., energy necessary for transmission of message) and improvement in the number of secure links must be balanced. We inspect classes of secrecy amplification protocols known as node-oriented and group-oriented protocols proposed for use in wireless sensor networks (WSN). Usage of various key (pre-)distribution schemes (KDSs) in networks with an active attacker results in a partially compromised network where some fraction of keys used to protect link communication is known to the attacker. The secrecy amplification protocols were proposed to secure again some previously compromised communication links by using non-compromised paths to deliver new secure keys. Design of suitable secrecy amplification protocols remains a challenge in scenarios where a trade-off between necessary resources (e.g., energy necessary for transmission of message) and improvement in the number of secure links must be balanced. We inspect classes of secrecy amplification protocols known as node-oriented and group-oriented protocols proposed for use in wireless sensor networks (WSN).
dcterms:title
A New Approach to Secrecy Amplification in Partially Compromised Networks A New Approach to Secrecy Amplification in Partially Compromised Networks
skos:prefLabel
A New Approach to Secrecy Amplification in Partially Compromised Networks A New Approach to Secrecy Amplification in Partially Compromised Networks
skos:notation
RIV/00216224:14330/14:00073940!RIV15-MSM-14330___
n3:aktivita
n6:S n6:P
n3:aktivity
P(GAP202/11/0422), S
n3:dodaniDat
n9:2015
n3:domaciTvurceVysledku
n12:9095128 n12:4292715
n3:druhVysledku
n22:D
n3:duvernostUdaju
n14:S
n3:entitaPredkladatele
n21:predkladatel
n3:idSjednocenehoVysledku
872
n3:idVysledku
RIV/00216224:14330/14:00073940
n3:jazykVysledku
n4:eng
n3:klicovaSlova
Secrecy Amplification; Wireless Sensor Networks; Partially Compromised Networks
n3:klicoveSlovo
n18:Wireless%20Sensor%20Networks n18:Partially%20Compromised%20Networks n18:Secrecy%20Amplification
n3:kontrolniKodProRIV
[A84C043EF981]
n3:mistoKonaniAkce
Pune
n3:mistoVydani
Heidelberg
n3:nazevZdroje
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference
n3:obor
n17:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
3
n3:projekt
n15:GAP202%2F11%2F0422
n3:rokUplatneniVysledku
n9:2014
n3:tvurceVysledku
Matyáš, Václav Ošťádal, Radim Švenda, Petr
n3:typAkce
n20:WRD
n3:zahajeniAkce
2014-01-01+01:00
s:issn
0302-9743
s:numberOfPages
18
n19:doi
10.1007/978-3-319-12060-7_7
n10:hasPublisher
Springer-Verlag
n13:isbn
9783319120591
n16:organizacniJednotka
14330