-
2
-
-
27644461868
-
Elf: An efficient log-structured flash file system for micro sensor nodes
-
Baltimore, MD, USA, Novemeber
-
H. Dai and R. Han. Elf: An efficient log-structured flash file system for micro sensor nodes. In 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, Novemeber 2004.
-
(2004)
2nd International Conference on Embedded Networked Sensor Systems
-
-
Dai, H.1
Han, R.2
-
3
-
-
4243199653
-
The performance evaluation of intrusion-tolerant routing in wireless sensor networks
-
Palo Alto, CA, USA, April
-
J. Deng, R. Han, and S. Mishra. The performance evaluation of intrusion-tolerant routing in wireless sensor networks. In IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN'03), Palo Alto, CA, USA, April 2003.
-
(2003)
IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN'03)
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
5
-
-
0013043106
-
Highly resilient, energy efficient multipath routing in wireless sensor networks
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly resilient, energy efficient multipath routing in wireless sensor networks. Mobile Computing and Communica-tion Review (MC2R), 1(2), 2002.
-
(2002)
Mobile Computing and Communica-tion Review (MC2R)
, vol.1
, Issue.2
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
8
-
-
27644599432
-
Arrive: Algorithm for robust routing in volatile environments
-
Computer Science Department, University of California at Berkeley, May
-
C. Karlof, Y. Li, and J. Polastre. Arrive: Algorithm for robust routing in volatile environments. Technical Report Technical Report UCBCSD-02-1233, Computer Science Department, University of California at Berkeley, May 2002.
-
(2002)
Technical Report Technical Report
, vol.UCBCSD-02-1233
-
-
Karlof, C.1
Li, Y.2
Polastre, J.3
-
10
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), September 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
-
-
Karlof, C.1
Wagner, D.2
-
12
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
San Diego, CA, USA, February
-
D. Liu and P. Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In 10th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 2003.
-
(2003)
10th Annual Network and Distributed System Security Symposium
-
-
Liu, D.1
Ning, P.2
-
13
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, CA, USA, October
-
D. J. Malan, M. Welsh, and M. D. Smith. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks(SECON'04), Santa Clara, CA, USA, October 2004.
-
(2004)
1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks(SECON'04)
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
14
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
A. Perrig, R. Canetti, J. Tygar, and D. X. Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, pages 56-73, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.X.4
-
15
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. Spins: Security protocols for sensor networks. Wireless Networks Journal(WINET), 8(5):521-534, September 2002.
-
(2002)
Wireless Networks Journal(WINET)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
16
-
-
4544244334
-
Sia: Secure information aggregation in sensor networks
-
Los Angeles, CA, USA, November
-
B. Przydatek, D. Song, and A. Perrig. Sia: Secure information aggregation in sensor networks. In ACM SenSys'03, Los Angeles, CA, USA, November 2003.
-
(2003)
ACM SenSys'03
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
17
-
-
33745962983
-
On the computation-storage trade-offs of hash chain traversal
-
Le Gosier, Guadeloupe, January
-
Y. Sella. On the computation-storage trade-offs of hash chain traversal. In 7th International Financial Cryptography Conference, Le Gosier, Guadeloupe, January 2003.
-
(2003)
7th International Financial Cryptography Conference
-
-
Sella, Y.1
-
18
-
-
18844378578
-
Taming the underlining challenges of reliable multihop routing in sensor networks
-
Los Angeles, CA, USA, November
-
A. Woo, T. Tong, and D. Culler. Taming the underlining challenges of reliable multihop routing in sensor networks. In SenSys'03, Los Angeles, CA, USA, November 2003.
-
(2003)
SenSys'03
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
19
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. Wood and J. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
20
-
-
0348195762
-
Jam: A jammed-area mapping service for sensor networks
-
Cancun, Mexico, December
-
A. D. Wood, J. A. Stankovic, and S. H. Son. Jam: A jammed-area mapping service for sensor networks. In 24th IEEE Real-time Systems Symposium (RTSS'03), Cancun, Mexico, December 2003.
-
(2003)
24th IEEE Real-time Systems Symposium (RTSS'03)
-
-
Wood, A.D.1
Stankovic, J.A.2
Son, S.H.3
-
21
-
-
2442529460
-
Gradient broadcast: A robust data delivery protocol for large scale sensor networks
-
to appear March
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Gradient broadcast: A robust data delivery protocol for large scale sensor networks, to appear in ACM Wireless Networks (WINET), Vol. 11, No.2, March 2005.
-
(2005)
ACM Wireless Networks (WINET)
, vol.11
, Issue.2
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
22
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route detection and filtering of injected false data in sensor networks. In IEEE INFOCOM 2004.
-
IEEE INFOCOM 2004
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
23
-
-
18844411823
-
Understanding packet delivery performance in dense wireless sensor networks
-
Los Angeles, CA, USA, November
-
J. Zhao and R. Govindan. Understanding packet delivery performance in dense wireless sensor networks. In SenSys'03, Los Angeles, CA, USA, November 2003.
-
(2003)
SenSys'03
-
-
Zhao, J.1
Govindan, R.2
-
24
-
-
4544263123
-
Impact of radio irregularity on wireless sensor networks
-
Boston, MA, USA, June
-
G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic. Impact of radio irregularity on wireless sensor networks. In the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys'04), Boston, MA, USA, June 2004.
-
(2004)
The 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys'04)
-
-
Zhou, G.1
He, T.2
Krishnamurthy, S.3
Stankovic, J.A.4
-
25
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington D.C, USA, October
-
S. Zhu, S. Setia, and S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. In CCS'03, Washington D.C, USA, October 2003.
-
(2003)
CCS'03
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
26
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
Oakland, CA, USA, May
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In 2004 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2004.
-
(2004)
2004 IEEE Symposium on Security and Privacy
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|