-
1
-
-
14344252668
-
Real-time communication and coordination in embedded sensor networks
-
Stankovic, J.A., Abdelzaher, T.F., Lu, C., Sha, L., Hou, J.C.: Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE 91 (2003) 1002-1022
-
(2003)
Proceedings of the IEEE
, vol.91
, pp. 1002-1022
-
-
Stankovic, J.A.1
Abdelzaher, T.F.2
Lu, C.3
Sha, L.4
Hou, J.C.5
-
2
-
-
36349021963
-
-
Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Security for Wireless Sensor Networks. [26] 253-275
-
Security for Wireless Sensor Networks
, Issue.26
, pp. 253-275
-
-
Avancha, S.1
Undercoffer, J.2
Joshi, A.3
Pinkston, J.4
-
3
-
-
34047212873
-
Ultra low energy wireless temperature sensor network implementation
-
Berlin, Germany
-
Kohvakka, M., Hännikäinen, M., Hämäläinen, T.D.: Ultra low energy wireless temperature sensor network implementation. In: Proc. 16th IEEE Int. Symp. Personal Indoor and Mobile Radio Comm. (PIMRC 2005), Berlin, Germany (2005)
-
(2005)
Proc. 16th IEEE Int. Symp. Personal Indoor and Mobile Radio Comm. (PIMRC 2005)
-
-
Kohvakka, M.1
Hännikäinen, M.2
Hämäläinen, T.D.3
-
5
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and counter-measures
-
Karloff, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and counter-measures. Elsevier Ad Hoc Networks 1 (2003) 293-315
-
(2003)
Elsevier Ad Hoc Networks
, vol.1
, pp. 293-315
-
-
Karloff, C.1
Wagner, D.2
-
6
-
-
11144340927
-
Designing secure sensor networks
-
Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Comm. 11 (2004) 38-43
-
(2004)
IEEE Wireless Comm.
, vol.11
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
7
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47 (2004) 53-57
-
(2004)
Communications of the ACM
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35 (2002) 54-62
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
9
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA
-
Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Proc. 2nd Int. Conf. Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, USA (2004) 162-175
-
(2004)
Proc. 2nd Int. Conf. Embedded Networked Sensor Systems (SenSys 2004)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
10
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Kluwer Wireless Networks (2002) 521-534
-
(2002)
Kluwer Wireless Networks
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
11
-
-
84941147765
-
-
IEEE: lEEE Std. 802.15.4 (2003)
-
IEEE: lEEE Std. 802.15.4. (2003)
-
-
-
-
14
-
-
84941163640
-
-
Chan, H., Perrig, A., Song, D.: Key Distribution Techniques for Sensor Networks. [26] 277-303
-
Key Distribution Techniques for Sensor Networks
, Issue.26
, pp. 277-303
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
15
-
-
33645091897
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. Elsevier Pervasive and Mobile Computing (2005) 425-445
-
(2005)
Elsevier Pervasive and Mobile Computing
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Shantz, S.C.8
-
16
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Joye, M., Quisquater, J.J., eds.: Springer
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Joye, M., Quisquater, J.J., eds.: Lecture Notes in Computer Science. Volume 3156. Springer (2004) 119-132
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
17
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
Kauai Island, HI, USA
-
Gaubatz, G., Kaps, J.P., Öztürk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proc. Workshop on Pervasive Computing and Comm. Security (PerSec'05), Kauai Island, HI, USA (2005) 146-150
-
(2005)
Proc. Workshop on Pervasive Computing and Comm. Security (PerSec'05)
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.P.2
Öztürk, E.3
Sunar, B.4
-
18
-
-
10044284351
-
LEAP: Efficient security mechanism for large-scale distributed sensor networks
-
Washington D.C., USA
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanism for large-scale distributed sensor networks. In: Proc. 10th ACM Conf. Computer and Comm. Security (CCS'03), Washington D.C., USA (2003) 62-72
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS'03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
20
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable and Secure Computing 3 (2006) 62-77
-
(2006)
IEEE Trans. Dependable and Secure Computing
, vol.3
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
21
-
-
0003237987
-
The Kerberos network authentication service (V5)
-
Kohl, J., Neuman, C.: The Kerberos network authentication service (V5). RFC 1510 (1993)
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, C.2
-
25
-
-
34547991429
-
-
Unpublished
-
Hämäläinen, P., Alho, T., Hännikäinen, M., Hämäläinen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. Unpublished (2006)
-
(2006)
Design and Implementation of Low-area and Low-power AES Encryption Hardware Core
-
-
Hämäläinen, P.1
Alho, T.2
Hännikäinen, M.3
Hämäläinen, T.D.4
-
26
-
-
13244276908
-
-
Raghavendra, C.S., Sivalingam, K.M., Znati, T., eds.: Springer
-
Raghavendra, C.S., Sivalingam, K.M., Znati, T., eds.: Wireless Sensor Networks. 1 edn. Springer (2004)
-
(2004)
Wireless Sensor Networks. 1 Edn.
-
-
|