-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I. F., Su, W., Sankarasubramanian, Y., and Cayirci, E. Wireless sensor networks: A survey, Computer Networks, 38, 4 (2002), 393-422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramanian, Y.3
Cayirci, E.4
-
3
-
-
0033296116
-
Untraceable mobility or how to travel incognito
-
Ateniese, G., Herzberg, A., Krawczyk, H., and Tsudik, G. Untraceable mobility or how to travel incognito, Computer Networks, 31, 8 (1999), 871-884.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 871-884
-
-
Ateniese, G.1
Herzberg, A.2
Krawczyk, H.3
Tsudik, G.4
-
4
-
-
0036487702
-
PAWNs: Satisfying the need for ubiquitous secure connectivity and location services
-
Bahl, P., Russell, W., Wang, Y.-M, Balachandran, A., Voelker, G. M. and Miu, A. PAWNs: satisfying the need for ubiquitous secure connectivity and location services, IEEE Wireless Communications, 9, 1 (2002), 40-48.
-
(2002)
IEEE Wireless Communications
, vol.9
, Issue.1
, pp. 40-48
-
-
Bahl, P.1
Russell, W.2
Wang, Y.-M.3
Balachandran, A.4
Voelker, G.M.5
Miu, A.6
-
5
-
-
3543122629
-
Secure pebblenets
-
Long Beach, California, October
-
Basagni, S., Herrin, K., Rosti, E. and Bruschi, D. Secure pebblenets, In Proceedings of the MobiHoc (Long Beach, California, October 2001).
-
(2001)
Proceedings of the MobiHoc
-
-
Basagni, S.1
Herrin, K.2
Rosti, E.3
Bruschi, D.4
-
6
-
-
84963503600
-
Project anonymity and unobservability in the Internet
-
Berthold, O., Federrath, H. and Köhntopp, M. Project anonymity and unobservability in the Internet, In Proceedings of the Computers Freedom and Privacy (CFP 2000), Workshop on Freedom and Privacy by Design, 2000.
-
(2000)
Proceedings of the Computers Freedom and Privacy (CFP 2000), Workshop on Freedom and Privacy by Design
-
-
Berthold, O.1
Federrath, H.2
Köhntopp, M.3
-
7
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford, A. and Stajano, F. Location privacy in pervasive computing, Pervasive Computing, 2, 1 (2003), 46-55.
-
(2003)
Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
8
-
-
11244290742
-
-
EPFL-IC Tech. Report No. IC/2004/10
-
Capkun, S., Hubaux, J.-P., and Jakobsson, M. Secure and privacy-preserving communication in hybrid ad hoc networks, EPFL-IC Tech. Report No. IC/2004/10, 2004.
-
(2004)
Secure and Privacy-preserving Communication in Hybrid Ad Hoc Networks
-
-
Capkun, S.1
Hubaux, J.-P.2
Jakobsson, M.3
-
9
-
-
0010461175
-
-
Tech. Rep. #00-010, NAI Labs
-
Carman, D. W., Kruus, P. S. and Matt, B. J., Constraints and approaches for distributed sensor network security, Tech. Rep. #00-010, NAI Labs, 2000.
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
11
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
Oakland, California, October
-
Chan, H., Perrig, A. and Song, D., Random key predistribution schemes for sensor networks, In Proceedings of the IEEE Symposium on Security and Privacy, (Oakland, California, October 2003).
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
4344668573
-
Overview of sensor networks
-
Culler, D., Estrin, D. and Srivastava, M. Overview of sensor networks, IEEE Computer, 37, 8 (2004), 41-49.
-
(2004)
IEEE Computer
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
13
-
-
12444324513
-
Providing secrecy in key management protocols for large wireless sensor networks
-
DiPietro, R., Mancini, L. V. and Jajodia, S. Providing secrecy in key management protocols for large wireless sensor networks, Journal of AdHoc Networks, 1, 4 (2003), 455-468.
-
(2003)
Journal of AdHoc Networks
, vol.1
, Issue.4
, pp. 455-468
-
-
Dipietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
15
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Du, W., Deng, J., Han, Y. S., Chen, S. and Varshney, P. A key management scheme for wireless sensor networks using deployment knowledge, In Proceedings of the IEEE INFOCOM'04 (2004).
-
(2004)
Proceedings of the IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
17
-
-
12444307460
-
On modeling wireless sensor networks
-
Gracanin, D., Eltoweissy, M., Olariu, S. and Wadaa, A. On modeling wireless sensor networks, In Proceedings of the IEEE Workshop on Mobile Ad Hoc and Sensor Networks (WMAN'04), (2004).
-
(2004)
Proceedings of the IEEE Workshop on Mobile Ad Hoc and Sensor Networks (WMAN'04)
-
-
Gracanin, D.1
Eltoweissy, M.2
Olariu, S.3
Wadaa, A.4
-
19
-
-
16244372290
-
Towards a new paradigm for securing wireless sensor networks
-
NSPW'2003 August
-
Jones, K., Wadaa, A., Olariu, S, Wilson, L. and Eltoweissy, M. Towards a new paradigm for securing wireless sensor networks, In Proceedings of the Workshop on New Security Paradigms, (NSPW'2003) (August 2003).
-
(2003)
Proceedings of the Workshop on New Security Paradigms
-
-
Jones, K.1
Wadaa, A.2
Olariu, S.3
Wilson, L.4
Eltoweissy, M.5
-
24
-
-
85000276942
-
Multi-level μTESLA: A broadcast authentication system for distributed sensor networks
-
Liu, D. and Ning, P. Multi-level μTESLA: A broadcast authentication system for distributed sensor networks, ACM Transactions in Embedded Computing Systems (2004).
-
(2004)
ACM Transactions in Embedded Computing Systems
-
-
Liu, D.1
Ning, P.2
-
25
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A. J., Van Oorschot, P. and Vanstone, S. Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.2
Vanstone, S.3
-
26
-
-
0028397595
-
Authentication of mobile users
-
Molva, R., Samfat, D. and Tsudik, G. Authentication of mobile users, IEEE Network, 8, 2 (1994), 26-34.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
27
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Newsome, J., Shi, R., Song, D. and Perrig, A. The sybil attack in sensor networks: Analysis and defenses, In Proceedings of the IEEE International Conference on Information Processing in Sensor Networks, (1PSN 2004), (2004).
-
(2004)
Proceedings of the IEEE International Conference on Information Processing in Sensor Networks, (1PSN 2004)
-
-
Newsome, J.1
Shi, R.2
Song, D.3
Perrig, A.4
-
28
-
-
4444346335
-
Wireless sensor networks: Leveraging the virtual infrastructure
-
Olariu, S., Wadaa, A., Wilson, L. and Eltoweissy, M. Wireless sensor networks: leveraging the virtual infrastructure, IEEE Network, 18, 4 (2004), 51-56.
-
(2004)
IEEE Network
, vol.18
, Issue.4
, pp. 51-56
-
-
Olariu, S.1
Wadaa, A.2
Wilson, L.3
Eltoweissy, M.4
-
29
-
-
33646713379
-
Simple self-organization protocol for massively deployed sensor networks
-
to appear
-
Olariu, S. and Xu, Q. A simple self-organization protocol for massively deployed sensor networks, Computer Communications, (2005) to appear.
-
(2005)
Computer Communications
-
-
Olariu, S.1
Xu, Q.A.2
-
30
-
-
84954192338
-
On the impact of alternate path routing for load balancing in mobile ad hoc networks
-
Pearlman, M. R., Haas, Z. J., Sholander, P. and Tabrizi, S. S. On the impact of alternate path routing for load balancing in mobile ad hoc networks, In Proceedings of the MobiHoc (2000).
-
(2000)
Proceedings of the MobiHoc
-
-
Pearlman, M.R.1
Haas, Z.J.2
Sholander, P.3
Tabrizi, S.S.4
-
31
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Perrig, A., Canetti, R., Tygar, D. and Song, D. The TESLA broadcast authentication protocol, RSA CryptoBytes, 5, 2 (2002), 2-13.
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
32
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J. D. SPINS: Security protocols for sensor networks, Wireless Networks, 8, 5 (2002), 521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
33
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J. and Wagner, D. Security in wireless sensor networks, Communications of the ACM, 47, 6 (2004), 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
34
-
-
0008144259
-
-
H. Federrath, editor, DIAU'00, LNCS 2009
-
Pfitzmann, and Köhntopp, M. Anonymity, unobservability, and pseudonymity -a proposal for terminology. In H. Federrath, editor, DIAU'00, LNCS 2009, 2000, 1-9.
-
(2000)
Anonymity, Unobservability, and Pseudonymity -A Proposal for Terminology
, pp. 1-9
-
-
Fitzmann, P.1
Köhntopp, M.2
-
36
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M. G., Syverson, P. F. and Goldschlag, D. M., Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, 16, 4 (1998).
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, pp. 4
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
37
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Reiter, M. K. and Rubin, A. D. Crowds: Anonymity for web transactions, ACM Transactions on Information and System Security, I, 1 (1998), 66-92.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
40
-
-
0034291065
-
Protocols fur self-organization of a wireless sensor network
-
Sohrabi, K., Gao, J., Ailawadhi, V. and Pottie, G. Protocols fur self-organization of a wireless sensor network, IEEE Personal Communications, 7, 5 (2000), 16-27.
-
(2000)
IEEE Personal Communications
, vol.7
, Issue.5
, pp. 16-27
-
-
Sohrabi, K.1
Gao, J.2
Ailawadhi, V.3
Pottie, G.4
-
41
-
-
10944236901
-
Methods for scalable self-assembly of ad hoc wireless sensor networks
-
Sohrabi, K., et al, Methods for scalable self-assembly of ad hoc wireless sensor networks, IEEE Transactions on Mobile Computing, 3, 4 (2004), 317-331.
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.4
, pp. 317-331
-
-
Sohrabi, K.1
-
42
-
-
17444366210
-
Training a wireless sensor network
-
Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M. and Jones K. Training a wireless sensor network, Mobile Networks and Applications, 10, (2005), 151-167.
-
(2005)
Mobile Networks and Applications
, vol.10
, pp. 151-167
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Eltoweissy, M.4
Jones, K.5
-
43
-
-
32144446334
-
Scalable key management for secure communications in wireless sensor networks
-
Tokyo, Japan, March 23-26
-
Wadaa, A., Olariu, S., Wilson, L. and Eltoweissy, M., Scalable key management for secure communications in wireless sensor networks, In Proceedings of the International Workshop on Wireless Ad-hoc Networking (Tokyo, Japan, March 23-26, 2004).
-
(2004)
Proceedings of the International Workshop on Wireless Ad-hoc Networking
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Eltoweissy, M.4
-
44
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A. D. and Stankovic, J. A. Denial of service in sensor networks, IEEE Computer, 35, 4 (2002), 54-62.
-
(2002)
IEEE Computer
, vol.35
, Issue.4
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
45
-
-
84861599421
-
Differentiated surveillance for sensor networks
-
Los Angeles, California, November
-
Van, T., He, T. and Stankovic, J. A. Differentiated surveillance for sensor networks, In Proceedings of the ACM SenSys, (Los Angeles, California, November 2003).
-
(2003)
Proceedings of the ACM SenSys
-
-
Van, T.1
He, T.2
Stankovic, J.A.3
-
48
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
March
-
Ye, F., Luo, H., Lu, S. and Zhang, L. Statistical en-route filtering of injected false data in sensor networks, In Proceedings of the IEEE INFOCOM (March 2004).
-
(2004)
Proceedings of the IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
49
-
-
0343898172
-
New frontiers: Selfassembly and nano-electronics
-
Zhimov, V. V. and Herr, D. J. C. New frontiers: selfassembly and nano-electronics, IEEE Computer, 34, 1 (2001), 34-43.
-
(2001)
IEEE Computer
, vol.34
, Issue.1
, pp. 34-43
-
-
Zhimov, V.V.1
Herr, D.J.C.2
-
50
-
-
0033357103
-
Securing ad-hoc networks
-
Zhou, L. and Haas, Z.J. Securing ad-hoc networks, IEEE Network, 13, 6 (1999), 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
52
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering data in sensor networks
-
May
-
Zhu, S., Setia, S., Jajodia, S. and Ning, P. An interleaved hop-by-hop authentication scheme for filtering data in sensor networks, In Proceedings of the IEEE Symposium on Security and Privacy (May 2004).
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|