-
1
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks," Wirefew Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wirefew Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, D.3
Wen, V.4
Culler, D.5
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M.Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications, vol. 16, pp. 482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
10
-
-
0036346460
-
ASCENT: Adaptive self-configuring sensor networks topologies
-
June
-
A. Cerpa and D. Estrin, "ASCENT: Adaptive Self-Configuring Sensor Networks Topologies," in Proceedings of IEEE INFOCOM'02, June 2002.
-
(2002)
Proceedings of IEEE INFOCOM'02
-
-
Cerpa, A.1
Estrin, D.2
-
12
-
-
1542347200
-
Parametric probabilistic sensor network routing
-
C. L. Barrett, S.J.Eidenbenz, L. Kroc, M. Marathe, and J. P. Smit, "Parametric probabilistic sensor network routing," in Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, 2003.
-
(2003)
Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications
-
-
Barrett, C.L.1
Eidenbenz, S.J.2
Kroc, L.3
Marathe, M.4
Smit, J.P.5
-
17
-
-
2442558299
-
Lightweight probabilistic broadcast
-
November
-
P. Th. Eugster, R. Guerraoui, S. B. Handurukande, P. Kouznetsov, and A.-M. Kermarrec, "Lightweight probabilistic broadcast," ACM Transactions on Computer Systems (TOCS), vol. 21, no. 4, pp. 341-374, November 2003.
-
(2003)
ACM Transactions on Computer Systems (TOCS)
, vol.21
, Issue.4
, pp. 341-374
-
-
Th Eugster, P.1
Guerraoui, R.2
Handurukande, S.B.3
Kouznetsov, P.4
Kermarrec, A.-M.5
-
21
-
-
84928433512
-
Context and location: Framework for security and privacy in automotive telematics
-
S. Dun, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang, "Context and Location: Framework for security and privacy in automotive telematics," in Proceedings of the 2nd international workshop on Mobile commerce, 2002.
-
(2002)
Proceedings of the 2nd International Workshop on Mobile Commerce
-
-
Dun, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.7
-
23
-
-
0022130080
-
A data distortion by probabality distribution
-
C. K. Liew, U. J. Choi, and C. J. Liew, "A data distortion by probabality distribution," ACM Transactions on Database Systems, vol. 10, no. 3, pp. 395-411, 1985.
-
(1985)
ACM Transactions on Database Systems
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
24
-
-
0016931209
-
Intentional resolution of privacy protection in database systems
-
N. Minsky, "Intentional resolution of privacy protection in database systems," Communications of the ACM, vol. 19, no. 3, pp. 148-159, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.3
, pp. 148-159
-
-
Minsky, N.1
|