-
2
-
-
0036487702
-
PAWNs: Satisfying the need for ubiquitous secure connectivity and location services
-
P. Bahl, W. Russell, Y.-M. Wang, A. Balachandran, G.M. Voelker, and A. Miu PAWNs: satisfying the need for ubiquitous secure connectivity and location services IEEE Wireless Communications 9 1 2002
-
(2002)
IEEE Wireless Communications
, vol.9
, Issue.1
-
-
Bahl, P.1
Russell, W.2
Wang, Y.-M.3
Balachandran, A.4
Voelker, G.M.5
Miu, A.6
-
4
-
-
33646919610
-
Combinatorial optimization for key management in secure multicast environments
-
in press
-
M. Eltoweissy, H. Heydari, L. Morales, H. Sudborough, Combinatorial optimization for key management in secure multicast environments, Journal of Network and System Management, in press.
-
Journal of Network and System Management
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
Sudborough, H.4
-
5
-
-
28444433009
-
Random key pre-distribution schemes for sensor networks
-
Berkeley, CA, May
-
H. Chan, A. Perrig, D. Song, Random key pre-distribution schemes for sensor networks, in: Proceedings of IEEE 2003 Symposium on Security and Privacy, Berkeley, CA, May 2003.
-
(2003)
Proceedings of IEEE 2003 Symposium on Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
0010461175
-
Constraints and approaches for distributed sensor networks security
-
September
-
D. Carman, P. Kruus, B. Matt, Constraints and approaches for distributed sensor networks security, NAI Technical Report #00-010, September 2000.
-
(2000)
NAI Technical Report #00-010
, Issue.10
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
7
-
-
21844443951
-
-
TinySec, Available from < http://www.cs.berkeley.edu/~nks/tinysec/ >.
-
TinySec
-
-
-
9
-
-
3042546486
-
A hierarchical key management method for low-energy wireless sensor networks
-
November
-
G. Jolly, M. Kuşçu, P. Kokate, A hierarchical key management method for low-energy wireless sensor networks, UMBC Online Document, November 2002.
-
(2002)
UMBC Online Document
-
-
Jolly, G.1
Kuşçu, M.2
Kokate, P.3
-
10
-
-
3042590883
-
On training wireless sensor networks
-
Nice, France, April
-
A. Wadaa, S. Olariu, L. Wilson, K. Jones, Q. Xu, On training wireless sensor networks, in: Proceedings of 3rd International Workshop on Wireless, Mobile and Ad Hoc Networks, Nice, France, April 2003.
-
(2003)
Proceedings of 3rd International Workshop on Wireless, Mobile and Ad Hoc Networks
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Jones, K.4
Xu, Q.5
-
11
-
-
21844445158
-
Secure training of wireless sensor networks
-
A. Wadaa, S. Olariu, M. Eltoweissy, L. Wilson, K. Jones, Secure training of wireless sensor networks, Special Issue of MONET, Mobile Networks and Applications.
-
Special Issue of MONET, Mobile Networks and Applications
-
-
Wadaa, A.1
Olariu, S.2
Eltoweissy, M.3
Wilson, L.4
Jones, K.5
-
12
-
-
0033357103
-
Securing ad-hoc networks
-
L. Zhou, and Z.J. Haas Securing ad-hoc networks IEEE Network 13 6 1999
-
(1999)
IEEE Network
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
-
14
-
-
0035789229
-
The quest for security in mobile ad-hoc networks
-
Long Beach, CA
-
J.-P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad-hoc networks, in: Proceedings of MOBIHOC, Long Beach, CA, 2001.
-
(2001)
Proceedings of MOBIHOC
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
15
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
IEEE CS Press Los Alamitos, CA
-
J. Kong Providing robust and ubiquitous security support for mobile ad-hoc networks Proceedings of 9th International Conference on Network Protocols 2001 IEEE CS Press Los Alamitos, CA 251 260
-
(2001)
Proceedings of 9th International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
-
16
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad-hoc networks
-
Boston, August 6-11
-
S. Marti et al., Mitigating routing misbehavior in mobile ad-hoc networks, in: Proceedings of MOBICOM'2000, Boston, August 6-11, 2000.
-
(2000)
Proceedings of MOBICOM'2000
-
-
Marti, S.1
-
18
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
Seattle
-
D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Next century challenges: scalable coordination in sensor networks, in: Proceedings of MOBICOM, 1999, Seattle, pp. 263-270, Available from < http://citeseer.nj.nec.com/estrin99next.html >.
-
(1999)
Proceedings of MOBICOM
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
Kumar, S.4
-
19
-
-
21844440932
-
-
Available from < http://www.cs.berkeley.edu/~jhill/spec/index.htm >.
-
-
-
-
21
-
-
21844478614
-
-
Available from < http://www.cs.odu.edu/~wadaa/code/ithKsubset/ >.
-
-
-
-
22
-
-
0037930557
-
Casting the wireless sensor net
-
July/August
-
G.T. Huang, Casting the wireless sensor net, MIT Technology Review, July/August 2003.
-
(2003)
MIT Technology Review
-
-
Huang, G.T.1
-
24
-
-
0035789229
-
The quest for security in mobile ad-hoc networks
-
Long Beach, CA, October
-
J.-P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad-hoc networks, in: Proceedings of ACM Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc'01), Long Beach, CA, October 2001, pp. 146-155.
-
(2001)
Proceedings of ACM Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc'01)
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
25
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Riverside, CA
-
J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks, in: Proceedings of 9th International Conference on Network Protocols, Riverside, CA, 2001, pp. 251-260.
-
(2001)
Proceedings of 9th International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
26
-
-
0343898172
-
New frontiers: Self-assembly and nano-electronics
-
V.V. Zhirnov, and D.J.C. Herr New frontiers: self-assembly and nano-electronics IEEE Computer 34 1 2001 34 43
-
(2001)
IEEE Computer
, vol.34
, Issue.1
, pp. 34-43
-
-
Zhirnov, V.V.1
Herr, D.J.C.2
-
27
-
-
0033357103
-
Securing ad-hoc networks
-
L. Zhu, and Z.J. Haas Securing ad-hoc networks IEEE Network 13 6 1999 24 30
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhu, L.1
Haas, Z.J.2
-
29
-
-
10044284351
-
LEAP: Effcient security mechanisms for large-scale distributed sensor networks
-
October
-
L. Zhu, S. Satia, S. Jajodia, LEAP: effcient security mechanisms for large-scale distributed sensor networks, in: Proceedings of ACM Conference on Computing and Communication Security, CCS'2003, October 2003.
-
(2003)
Proceedings of ACM Conference on Computing and Communication Security, CCS'2003
-
-
Zhu, L.1
Satia, S.2
Jajodia, S.3
-
31
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A key management scheme for wireless sensor networks using deployment knowledge, IEEE INFOCOM'04, March 2004.
-
(2004)
IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
|