-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz,W. Su, Y. Sankasubramaniam, and E. Cayirci. "Wireless Sensor Networks: A Survey", Computer Networks, 38:393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankasubramaniam, Y.3
Cayirci, E.4
-
6
-
-
25844466152
-
SPINs: Security protocols for sensor networks
-
Jul.
-
A. Perrig, et al. "SPINs: Security Protocols for Sensor Networks", in Proc. MobiCom, Jul. 2001.
-
(2001)
Proc. MobiCom
-
-
Perrig, A.1
-
10
-
-
32144459886
-
TinySec: A link layer security architecture for wireless sensor networks
-
Karlof. C, et al, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of ACM SenSys 2004.
-
Proceedings of ACM SenSys 2004
-
-
Karlof, C.1
-
11
-
-
84858895554
-
-
MICA2:Wireless Measurement System, http://www.xbow.com/Products/ Product_pdf_files/Wireless_pdf/6020-0042-05_A_MICA2.pdf
-
-
-
-
13
-
-
27644444697
-
The nesC language: A holistic approach to networked embedded systems
-
Jun.
-
D. Gay, et al. "The nesC Language: A Holistic Approach to Networked Embedded Systems" in Proc. Programming Language Design and Implementation, Jun. 2003.
-
(2003)
Proc. Programming Language Design and Implementation
-
-
Gay, D.1
-
18
-
-
0004102023
-
-
Specification version 1.1
-
Rivest, R., Robshaw, M., Sidney, R., Yin, Y., "The RC6 Block Cipher" Specification version 1.1 (1998)
-
(1998)
The RC6 Block Cipher
-
-
Rivest, R.1
Robshaw, M.2
Sidney, R.3
Yin, Y.4
-
19
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
June 10-12
-
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, Mani B. Srivastava, "On Communication Security in Wireless Ad-Hoc Sensor Networks", Proceedings of the 11th IEEE International Workshops on Enabling Technologie, p. 139-144, June 10-12, 2002
-
(2002)
Proceedings of the 11th IEEE International Workshops on Enabling Technologie
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
20
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Dez.
-
Mihir Bellare, Joe Kilian, Phillip Rogaway. "The Security of the Cipher Block Chaining Message Authentication Code". Journal of Computer and System Sciences, vol 3, Dez. 2000, pp. 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
21
-
-
33646769352
-
Simulating the power consumption of large-scale sensor network applications
-
ACM Press
-
Shnayder, V., Hempstead, et al, "Simulating the power consumption of large-scale sensor network applications." In ACM SenSys 2004 (Baltimore, MD, USA, Nov. 2004), ACM Press.
-
ACM SenSys 2004 (Baltimore, MD, USA, Nov. 2004)
-
-
Shnayder, V.1
Hempstead2
-
22
-
-
27644506856
-
B-MAC: An adaptive CSMA layer for low-power operation
-
December
-
J. Polastre, D. Culler. "B-MAC: An adaptive CSMA layer for low-power operation", UC Berkeley, Tech. Rep cs294-f03/bmac, December 2003.
-
(2003)
UC Berkeley, Tech. Rep
, vol.CS294-F03-BMAC
-
-
Polastre, J.1
Culler, D.2
|