-
4
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
New York, NY, Mar. IEEE
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proc. IEEE INFOCOM'99, volume 2, pages 708-716, New York, NY, Mar. 1999. IEEE.
-
(1999)
Proc. IEEE INFOCOM'99
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
5
-
-
84876090772
-
-
Crossbow, Inc. MICA2 data sheet. Available at http://www.xbow.com/ Products/Product_pdf-files/Wireless_pdf/MICA2n_Datasheet.pdf.
-
MICA2 Data Sheet
-
-
-
6
-
-
4544340566
-
Security support for in-network processing in wireless sensor networks
-
New York, NY, USA, ACM Press
-
J. Deng, R. Han, and S. Mishra. Security support for in-network processing in wireless sensor networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 83-93, New York, NY, USA, 2003. ACM Press.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 83-93
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
9
-
-
23944459661
-
Public key cryptography in sensor networks - Revisited
-
G. Gaubatz, J.-P. Kaps, and B. Sunar. Public key cryptography in sensor networks - revisited. In ESAS, pages 2-18, 2004.
-
(2004)
ESAS
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
10
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Kauai, March
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), Kauai, March 2005.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005)
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
11
-
-
35048818581
-
Comparing Elliptic curve cryptography and RSA on 8-bit CPUs
-
CHES2004
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In CHES2004, volume 3156 of LNCS, 2004.
-
(2004)
LNCS
, vol.3156
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
12
-
-
0037295692
-
Directed Diffusion for wireless sensor networking
-
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva. Directed Diffusion for wireless sensor networking. IEEE/ACM Trans. Netw., 11(1):2-16, 2003.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
13
-
-
85031131407
-
The emergence of networking abstractions and techniques in tinyos
-
P. Levis, S. Madden, D. Gay, J. Polastre, R. Szewczyk, A. Woo, E. Brewer, and D. Culler. The emergence of networking abstractions and techniques in tinyos. In First USENIX/ACM Symposium on Networked Systems Design and Implementation, 2004.
-
(2004)
First USENIX/ACM Symposium on Networked Systems Design and Implementation
-
-
Levis, P.1
Madden, S.2
Gay, D.3
Polastre, J.4
Szewczyk, R.5
Woo, A.6
Brewer, E.7
Culler, D.8
-
14
-
-
1142291591
-
The design of an acquisitional query processor for sensor networks
-
New York, NY, USA, ACM Press
-
S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. The design of an acquisitional query processor for sensor networks. In SIGMOD '03: Proceedings of the 2003 A CM SIGMOD international conference on Management of data, pages 491-502, New York, NY, USA, 2003. ACM Press.
-
(2003)
SIGMOD '03: Proceedings of the 2003 A CM SIGMOD International Conference on Management of Data
, pp. 491-502
-
-
Madden, S.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
15
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
Santa Clara, California, October
-
D. J. Malan, M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara, California, October 2004.
-
(2004)
First IEEE International Conference on Sensor and Ad Hoc Communications and Network
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
16
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Oorschot, P.C.V.2
Vanstone, S.A.3
-
17
-
-
44049105799
-
-
Moteiv, Inc. Tmote Sky datasheet. Available athttp://www.moteiv.com/ products/docs/tmote-sky-datasheet.pdf.
-
Tmote Sky Datasheet
-
-
-
18
-
-
0034771605
-
SPINS: Security protocols for sensor netowrks
-
ACM Press
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: security protocols for sensor netowrks. In Proceedings of the 7th annual international conference on Mobile computing and networking, pages 189-199. ACM Press, 2001.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
19
-
-
84943243577
-
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks
-
R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. J. M. Havinga. LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003.
-
(2003)
32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops)
-
-
Pietro, R.D.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.J.M.5
-
20
-
-
4544244334
-
SIA: Secure information aggregation in sensor networks
-
Nov
-
B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In ACM SenSys 2003, Nov 2003.
-
(2003)
ACM SenSys 2003
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
21
-
-
24644449780
-
Efficient cooperative signatures: A novel authentication scheme for sensor networks
-
number 3450 in LNCS, April
-
S. Seys and B. Preneel. Efficient cooperative signatures: A novel authentication scheme for sensor networks. In 2nd International Conference on Security in Pervasive Computing, number 3450 in LNCS, pages 86-100, April 2005.
-
(2005)
2nd International Conference on Security in Pervasive Computing
, pp. 86-100
-
-
Seys, S.1
Preneel, B.2
-
22
-
-
23944488346
-
Exploring message authentication in sensor networks
-
Security in Ad-hoc and Sensor Networks (ESAS), First European Workshop, Springer
-
H. Vogt. Exploring message authentication in sensor networks. In Security in Ad-hoc and Sensor Networks (ESAS), First European Workshop, volume 3313 of Lecture Notes in Computer Science, pages 19-30. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3313
, pp. 19-30
-
-
Vogt, H.1
-
24
-
-
23944498188
-
Sdd: Secure distributed diffusion protocol for sensor networks
-
First European Workshop on Security in Ad-hoc and Sensor Networks (ESAS)
-
X. Wang, L. Yang, and K. Chen. Sdd: Secure distributed diffusion protocol for sensor networks. In First European Workshop on Security in Ad-hoc and Sensor Networks (ESAS), volume 3313 of Lecture Notes in Computer Science, pages 205-214, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3313
, pp. 205-214
-
-
Wang, X.1
Yang, L.2
Chen, K.3
-
25
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
ACM Press
-
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus. TinyPK: securing sensor networks with public key technology. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59-64. ACM Press, 2004.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
26
-
-
4243182595
-
Networking support for query processing in sensor networks
-
A. Woo, S. Madden, and R. Govindan. Networking support for query processing in sensor networks. Commun. ACM, 47(6):47-52, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 47-52
-
-
Woo, A.1
Madden, S.2
Govindan, R.3
-
27
-
-
1442296009
-
The cougar approach to in-network query processing in sensor networks
-
Y. Yao and J. Gehrke. The cougar approach to in-network query processing in sensor networks. SIGMOD Rec., 31(3):9-18, 2002.
-
(2002)
SIGMOD Rec.
, vol.31
, Issue.3
, pp. 9-18
-
-
Yao, Y.1
Gehrke, J.2
-
28
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM, 2004.
-
(2004)
Proceedings of IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
30
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE Symposium on Security and Privacy, pages 259-271, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|