-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Elsevier Science
-
I Akyildiz, W. Su, Y. Sankarasubramanian, and E. Cayirci, Wireless sensor networks: A survey, Computer Networks, Elsevier Science, vol. 38, no. 4, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramanian, Y.3
Cayirci, E.4
-
2
-
-
0035121216
-
SmartDust: Communicating with a cubic-millimeter computer
-
January
-
Warneke, M. Last, B. Leibowitz, and K. Pister, SmartDust: communicating with a cubic-millimeter computer, IEEE Computer, vol. 34, no. 1, January 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.1
-
-
Warneke1
Last, M.2
Leibowitz, B.3
Pister, K.4
-
3
-
-
33646919610
-
Combinatorial optimization for key management in secure multicast environments
-
Kluwer Pobs, to appear
-
M. Eltoweissy, H. Heydari, L. Morales, and H Sudborough, "Combinatorial Optimization for Key Management in Secure Multicast Environments," Journal of Network and System Management, Kluwer Pobs, 2004, to appear.
-
(2004)
Journal of Network and System Management
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
Sudborough, H.4
-
4
-
-
28444433009
-
Random key pre-distribution schemes for sensor networks
-
Berkeley, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random Key Pre-distribution Schemes for Sensor Networks," Proceedings of IEEE 2003 Symposium on Security and Privacy, Berkeley, CA, May 2003.
-
(2003)
Proceedings of IEEE 2003 Symposium on Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
0010461175
-
Constraints and approaches for distributed sensor networks security
-
Sep.
-
D. Carman, P. Kruus, and B. Matt, "Constraints and Approaches for Distributed Sensor Networks Security," NAI Technical Report #00-010, Sep. 2000.
-
(2000)
NAI Technical Report #00-010
, Issue.10
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
6
-
-
84862378723
-
-
TinySec http://www.cs.berkeley.edu/~nks/tinysec/
-
-
-
-
8
-
-
3042546486
-
A hierarchical key management method for low-energy wireless sensor networks
-
Nov.
-
G. Jolly, M. Kuşçu, and P. Kokate, "A Hierarchical Key Management Method for Low-Energy Wireless Sensor Networks", UMBC Online Document, Nov. 2002.
-
(2002)
UMBC Online Document
-
-
Jolly, G.1
Kuşçu, M.2
Kokate, P.3
-
9
-
-
3042590883
-
On training wireless sensor networks
-
Nice, France, April
-
A. Wadaa, S. Olariu, L. Wilson, K. Jones, and Q. Xu, "On Training Wireless Sensor Networks," Proc. 3-rd International Workshop on Wireless, Mobile and Ad Hoc Networks, Nice, France, April 2003.
-
(2003)
Proc. 3-rd International Workshop on Wireless, Mobile and Ad Hoc Networks
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Jones, K.4
Xu, Q.5
-
10
-
-
3042599562
-
-
submitted for publication to a special issue of MONET
-
A. Wadaa, S. Olariu, M. Eltoweissy, L. Wilson, and K. Jones, "Secure Training of Wireless Sensor Networks, submitted for publication to a special issue of MONET.
-
Secure Training of Wireless Sensor Networks
-
-
Wadaa, A.1
Olariu, S.2
Eltoweissy, M.3
Wilson, L.4
Jones, K.5
-
11
-
-
0032627571
-
Key management for secure internet multicast using boolean function minimization techniques
-
IEEE, March
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques", Proceedings of Infocom'99, IEEE, March 1999.
-
(1999)
Proceedings of Infocom'99
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
12
-
-
24544476022
-
Whisper: Local secret maintenance in sensor networks
-
the Ohio State University, January
-
V. Naik, S. Bapat, A. Arora, and M. Gouda. Whisper: Local secret maintenance in sensor networks. Technical Report OSU-CISRC-1/03-TR04, The Ohio State University, January 2003.
-
(2003)
Technical Report
, vol.OSU-CISRC-1-03-TR04
-
-
Naik, V.1
Bapat, S.2
Arora, A.3
Gouda, M.4
-
13
-
-
84948990100
-
The RC5 encryption algorithm
-
B. Preneel, editor, Springer Verlag
-
R.L. Rivest. The RC5 encryption algorithm. In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 86-96, 1995. Springer Verlag.
-
(1995)
Fast Software Encryption, Volume 1008 of Lecture Notes in Computer Science
, vol.1008
, pp. 86-96
-
-
Rivest, R.L.1
-
14
-
-
84862382455
-
-
http://www.es.odu.edu/~wadaa/code/ithKsubset/
-
-
-
|