-
1
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem," ACM Trans. Programming Languages and Systems, vol. 4, no. 3, July 1982, pp. 382-401.
-
(1982)
ACM Trans. Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
2
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sept.
-
A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Wireless Networks J., vol. 8, no. 5, Sept. 2002, pp. 521-34.
-
(2002)
Wireless Networks J.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
-
5
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Oct.
-
W. Du et al., "A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Comp. and Commun. Security, Oct. 2003, pp. 42-51.
-
(2003)
Proc. 10th ACM Conf. Comp. and Commun. Security
, pp. 42-51
-
-
Du, W.1
-
8
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Comp., Oct. 2002, pp. 54-62.
-
(2002)
IEEE Comp.
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
9
-
-
0020128340
-
Theory of spread spectrum communications: A tutorial
-
May
-
R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, "Theory of Spread Spectrum Communications: A Tutorial," IEEE Trans. Commun., vol. 30, no. 5, May 1982, pp. 855-84.
-
(1982)
IEEE Trans. Commun.
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.L.1
Schilling, D.L.2
Milstein, L.B.3
-
14
-
-
0013044260
-
Highly resilient, energy-efficient multipath routing in wireless sensor networks
-
D. Ganesan et al., "Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks," Mobile Comp. and Commun. Review, 5(4):10-24, 2002.
-
(2002)
Mobile Comp. and Commun. Review
, vol.5
, Issue.4
, pp. 10-24
-
-
Ganesan, D.1
-
15
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
Sys., Nov.
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," Proc. 1st ACM Int'l. Conf. Embedded Networked Sensor Sys., Nov. 2003, pp. 255-65.
-
(2003)
Proc. 1st ACM Int'l. Conf. Embedded Networked Sensor
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
16
-
-
84860063750
-
-
Trusted Computing Group, https://www.trustedcomputing group.org/, 2003.
-
(2003)
-
-
-
19
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. MobiCom 2000, 2000, pp. 243-54.
-
(2000)
Proc. MobiCom 2000
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
20
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for Ad Hoc networks
-
Sept.
-
Y.-Chun Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure on-demand Routing Protocol for Ad Hoc Networks," Proc. Mobicom 2002, Sept. 2002.
-
(2002)
Proc. Mobicom 2002
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
21
-
-
11244338686
-
Secure positioning in sensor networks
-
Swiss Fed. Inst. Tech., Lausanne
-
S. Capkun and J.-P. Hubaux, "Secure Positioning in Sensor Networks," Tech. rep. EPFLIICI200444, Swiss Fed. Inst. Tech., Lausanne, 2004.
-
(2004)
Tech. Rep. EPFLIICI200444
-
-
Capkun, S.1
Hubaux, J.-P.2
-
23
-
-
25844439422
-
Secure positioning of wireless devices with appplication to sensor networks
-
to appear
-
S. Capkun and J.-P. Hubaux, "Secure Positioning of Wireless Devices with Appplication to Sensor Networks," to appear, IEEE INFOCOM 2005.
-
IEEE INFOCOM 2005.
-
-
Capkun, S.1
Hubaux, J.-P.2
-
24
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Apr.
-
Y.-C. Hu, Adrian Perrig, and David B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM 2003, Apr. 2003.
-
(2003)
Proc. IEEE INFOCOM 2003
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
|