-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramamam, and E. Cayirci. Wireless sensor networks: A survey. Computer Networks, 38(4):393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramamam, Y.3
Cayirci, E.4
-
2
-
-
0035789267
-
Secure pebblenets
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of ACM International Symposium on Mobile ad hoc networking and computing, pages 156-163, 2001.
-
(2001)
Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
3
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Advances in Cryptology - CRYPTO '92
-
C. Blundo, A. De Santiş, Amir Herrberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology - CRYPTO '92, LNCS 740, pages 471-486, 1993.
-
(1993)
LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santiş, A.2
Herrberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
4544365398
-
Constrains and approaches for distributed sensor network security
-
NAI Labs
-
D.W. Carman, P.S. Kruus, and B.J.Matt. Constrains and approaches for distributed sensor network security. Technical report, NAI Labs, 2000.
-
(2000)
Technical Report
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
5
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
March
-
H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In Proceedings of IEEE Infocom, March 2005.
-
(2005)
Proceedings of IEEE Infocom
-
-
Chan, H.1
Perrig, A.2
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04, March 2004.
-
(2004)
Proceedings of IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
10
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
November
-
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41-47, November 2002.
-
(2002)
Proceedings of the
, vol.9
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
11
-
-
0037702249
-
The nesC language: A holistic approach to networked embedded systems
-
June
-
D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler. The nesC language: A holistic approach to networked embedded systems. In Proceedings of Programming Language Design and Implementation (PLDI 2003), June 2003.
-
(2003)
Proceedings of Programming Language Design and Implementation (PLDI 2003)
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
12
-
-
0040520399
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and K. S. J. Pister. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93-104, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
14
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
October
-
D. Huang, M. Mehta, D. Medhi, and L. Ham. Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pages 29-42, October 2004.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 29-42
-
-
Huang, D.1
Mehta, M.2
Medhi, D.3
Ham, L.4
-
20
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001.
-
(2001)
Proceedings of Seventh Annual International Conference on Mobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
23
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, D.J.A.2
|