-
4
-
-
33744985257
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof, D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, NEST 2003.
-
NEST 2003
-
-
Karlof, C.1
Wagner, D.2
-
5
-
-
33744991057
-
Trust evaluation based security solution in ad hoc networks
-
NordSec 2003, 15th-17th October
-
Z. Yan, P. Zhang, T. Virtanen, Trust Evaluation Based Security Solution in Ad Hoc Networks, NordSec 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems, 15th-17th October 2003.
-
(2003)
Proceedings of the Seventh Nordic Workshop on Secure IT Systems
-
-
Yan, Z.1
Zhang, P.2
Virtanen, T.3
-
8
-
-
84994296501
-
The impact of data aggregation in wireless sensor networks
-
ICDCSW
-
B. Krishnamachari, D. Estrin, S. Wicker, The Impact of Data Aggregation in Wireless Sensor Networks, ICDCSW, Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 575-578, 2002.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems
, pp. 575-578
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.3
-
9
-
-
4544340566
-
Security support for in-network processing in wireless sensor networks
-
Conference on Computer and Communications Security
-
J. Deng, R. Han, S. Mishra, Security Support for In-Network Processing in Wireless Sensor Networks, Conference on Computer and Communications Security, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 83-93, 2003.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 83-93
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
10
-
-
3142684688
-
Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks
-
MILCOM '03. 2003 IEEE
-
S.S. Doumit, D.P. Agrawal, Self-Organized Criticality and Stochastic learning based intrusion detection system for wireless sensor networks, Military Communications Conference, 2003. MILCOM '03. 2003 IEEE, pp.609-614.
-
(2003)
Military Communications Conference
, pp. 609-614
-
-
Doumit, S.S.1
Agrawal, D.P.2
-
11
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM Press, New York
-
L. Eschenauer, V. D. Gilgor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communication Security, ACM Press, New York, 2002, pp. 41-47.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communication Security
, pp. 41-47
-
-
Eschenauer, L.1
Gilgor, V.D.2
-
12
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkely, California, May 11-14
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, Berkely, California, May 11-14 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
13
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington, DC, USA, October 27-31
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 27-31 2003, pp. 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
14
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: Security Protocols for Sensor Networks, Wireless Networks Journal (WINE), September 2002.
-
(2002)
Wireless Networks Journal (WINE)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
16
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
Oakland, California, May
-
S. Zhu, S. Setia, S. Jajodia, P. Ning, An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2004.
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
17
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, L. Zhang, Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE INFOCOM 2004.
-
Proceedings of IEEE INFOCOM 2004
-
-
Ye, F.1
Luo, H.2
Zhang, L.3
-
19
-
-
27644511275
-
Medians and beyond: New aggregation techniques for sensor networks
-
August 16
-
N. Shrivastava, C. Buragohain, D. Agrawal, S. Suri, Medians and Beyond: New Aggregation Techniques for Sensor Networks, Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), August 16 2004.
-
(2004)
Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004)
-
-
Shrivastava, N.1
Buragohain, C.2
Agrawal, D.3
Suri, S.4
-
20
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Los Angeles, April
-
Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust Statistical Methods for Securing Wireless Localization in Sensor Networks, IPSN 2005, Los Angeles, April 2005.
-
(2005)
IPSN 2005
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
|