-
1
-
-
84861263302
-
-
Crossbow technology inc. http://www.xbow.com.
-
-
-
-
2
-
-
84861263300
-
-
Moteiv. http://www.moteiv.com/.
-
-
-
-
3
-
-
84861263301
-
-
OpenSSL. http://www.openssl.org.
-
-
-
-
4
-
-
33746084746
-
Security architecture for the internet protocol
-
November
-
Security architecture for the Internet Protocol. RFC 2401, November 1998.
-
(1998)
RFC
, vol.2401
-
-
-
5
-
-
84861271403
-
Smart buildings admit their faults
-
UC Berkeley, November
-
Smart buildings admit their faults. Lab Notes: Research from the College of Engineering, UC Berkeley, http://www.coe.berkeley.edu/labnotes/1101smartbuildings.html, November 2001.
-
(2001)
Lab Notes: Research from the College of Engineering
-
-
-
6
-
-
84964559052
-
Wireless medium access control and physical layer specifications for low-rate wireless personal area networks
-
802.15.4-2003, May ISBN 0-7381-3677-5
-
Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003. ISBN 0-7381-3677-5.
-
(2003)
IEEE Standard
-
-
-
7
-
-
35248861711
-
Instant ciphertext-only cryptanalysis of GSM encrypted communication
-
Advances in Cryptology -CRYPTO 2003
-
Elad Barkan, Eli Biham, and Nathan Keller. Instant ciphertext-only cryptanalysis of GSM encrypted communication. In Advances in Cryptology -CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
9
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
December
-
Mihir Bellare, Joe Kilian, and Phillip Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, December 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
13
-
-
0037766154
-
Security flaws in 802.11 data link protocols
-
May Special Issue on Wireless Security
-
Nancy Cam-Winget, Russ Housley, David Wagner, and Jesse Walker. Security flaws in 802.11 data link protocols. Communications of the ACM, 46(5):35-39, May 2003. Special Issue on Wireless Security.
-
(2003)
Communications of the ACM
, vol.46
, Issue.5
, pp. 35-39
-
-
Cam-Winget, N.1
Housley, R.2
Wagner, D.3
Walker, J.4
-
15
-
-
67349176399
-
Automated cryptanalysis of XOR plaintext strings
-
April
-
E. Dawson and L. Nielsen. Automated cryptanalysis of XOR plaintext strings. Cryptologia, (2):165-181, April 1996.
-
(1996)
Cryptologia
, Issue.2
, pp. 165-181
-
-
Dawson, E.1
Nielsen, L.2
-
18
-
-
27644505653
-
Lightweight key management in wireless sensor networks by leveraging initial trust
-
SRI International, April
-
Bruno Dutertre, Steven Cheung, and Joshua Levy. Lightweight key management in wireless sensor networks by leveraging initial trust. Technical Report SRI-SDL-04-02, SRI International, April 2004.
-
(2004)
Technical Report
, vol.SRI-SDL-04-02
-
-
Dutertre, B.1
Cheung, S.2
Levy, J.3
-
21
-
-
0037702249
-
The nesC language: A holistic approach to network embedded systems
-
June
-
David Gay, Phil Levis, Rob von Behren, Matt Welsh, Eric Brewer, and David Culler. The nesC language: A holistic approach to network embedded systems. In Programming Language Design and Implementation (PLDI), June 2003.
-
(2003)
Programming Language Design and Implementation (PLDI)
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
22
-
-
0036602072
-
Hop integrity in computer networks
-
June
-
Mohamed G. Gouda, E.N. Elnozahy, Chin-Tser Huang, and Tommy M. McGuire. Hop integrity in computer networks. IEEE/ACM Transactions on Networking, 10(3):308-319, June 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.3
, pp. 308-319
-
-
Gouda, M.G.1
Elnozahy, E.N.2
Huang, C.-T.3
McGuire, T.M.4
-
23
-
-
17544377081
-
System architecture directions for networked sensors
-
November
-
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for networked sensors. In Proceedings of ACM ASPLOS IX, pages 93-104, November 2000.
-
(2000)
Proceedings of ACM ASPLOS IX
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
24
-
-
17144394279
-
The worldwide wardrive: The myths, the misconceptions, the truth, the future
-
August
-
Chris Hurley. The worldwide wardrive: The myths, the misconceptions, the truth, the future. In Defcon 11, August 2003.
-
(2003)
Defcon 11
-
-
Hurley, C.1
-
25
-
-
84935078039
-
Security weaknesses in Bluetooth. in
-
Springer-Verlag, LNCS 2020
-
Markus Jakobsson and Susanne Wetzel. Security weaknesses in Bluetooth. In CT-RSA 2001, pages 176-191. Springer-Verlag, 2001. LNCS 2020.
-
(2001)
CT-RSA 2001
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
26
-
-
27644599432
-
ARRIVE: Algorithm for robust routing in volatile environments
-
University of California at Berkeley, May
-
Chris Karlof, Yaping Li, and Joe Polastre. ARRIVE: Algorithm for robust routing in volatile environments. Technical Report UCB/CSD-03-1233, University of California at Berkeley, May 2002.
-
(2002)
Technical Report
, vol.UCB-CSD-03-1233
-
-
Karlof, C.1
Li, Y.2
Polastre, J.3
-
27
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
Advances in Cryptology - CRYPTO 2001, Springer-Verlag Heidelberg, January
-
Hugo Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science. Springer-Verlag Heidelberg, January 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
-
-
Krawczyk, H.1
-
33
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar. SPINS: Security protocols for sensor networks. In The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001), 2001.
-
(2001)
The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
37
-
-
27644537050
-
-
personal communication
-
Peter Shipley, 2003. personal communication.
-
(2003)
-
-
Shipley, P.1
-
38
-
-
0003477171
-
Using the fluhrer, mantin, and shamir attack to break WEP
-
Adam Stubblefield, John Ioannidis, and Aviel D. Rubin. Using the fluhrer, mantin, and shamir attack to break WEP. In Network and Distributed Systems Security Symposium (NDSS), 2002.
-
(2002)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.D.3
-
40
-
-
84947308909
-
The landmark hierarchy: A new hierarchy for routing in very large networks
-
P.F. Tsuchiya. The landmark hierarchy: a new hierarchy for routing in very large networks. ACM Computer Communication Review, 18(4):35-42, 1988.
-
(1988)
ACM Computer Communication Review
, vol.18
, Issue.4
, pp. 35-42
-
-
Tsuchiya, P.F.1
-
41
-
-
18844368499
-
Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis
-
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller, and Mihail Sichitiu. Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis. In 2003 International Conference, on Compilers, Architectures and Synthesis for Embedded Systems, pages 188-197, 2003.
-
(2003)
2003 International Conference, on Compilers, Architectures and Synthesis for Embedded Systems
, pp. 188-197
-
-
Venugopalan, R.1
Ganesan, P.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
43
-
-
77952939450
-
-
Ron Watro, Derrick Kong, Sue fen Cuti, Jen Mulligan, Charlie Gardiner, and Dan Coffin. TinyPK. http://www.is.bbn.com/projects/lws-nest/.
-
TinyPK
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Mulligan, J.4
Gardiner, C.5
Coffin, D.6
|