-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, "SPINS: Security protocols for sensor networks," in Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001.
-
(2001)
Proceedings of Seventh Annual International Conference on Mobile Computing and Networks
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
4
-
-
85000276942
-
Multi-level μTESLA: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multi-level μTESLA: Broadcast authentication for distributed sensor networks," ACM Transactions in Embedded Computing Systems (TECS), vol. 3, no. 4, 2004.
-
(2004)
ACM Transactions in Embedded Computing Systems (TECS)
, vol.3
, Issue.4
-
-
Liu, D.1
Ning, P.2
-
5
-
-
24944508408
-
Distillation codes and applications to dos resistant multicast authentication
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J. Tygar, "Distillation codes and applications to dos resistant multicast authentication"," in Proc. 11th Network and Distributed Systems Security Symposium (NDSS), 2004.
-
(2004)
Proc. 11th Network and Distributed Systems Security Symposium (NDSS)
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.5
-
6
-
-
17544377081
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and K. S. J. Pister, "System architecture directions for networked sensors," in Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
7
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient authentication and signing of multicast streams over lossy channels," in Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
9
-
-
33746530387
-
TESLA: Multicast source authentication transform
-
draft-irtf-smug-tesla-00.txt, November
-
A. Perrig, R. Canetti, Briscoe, J. Tygar, and D. Song, "TESLA: Multicast source authentication transform," IRTF draft, draft-irtf-smug-tesla-00.txt, November 2000.
-
(2000)
IRTF Draft
-
-
Perrig, A.1
Canetti, R.2
Briscoe3
Tygar, J.4
Song, D.5
-
10
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
February
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proceedings of Network and Distributed System Security Symposium, February 2001.
-
(2001)
Proceedings of Network and Distributed System Security Symposium
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
11
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Research in Security and Privacy, 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Research in Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in Proceedings of IEEE INFOCOM'04, March 2004.
-
(2004)
Proceedings of IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
13
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
October
-
W. Du, J. Deng, Y. S. Han, and P. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks," in Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 42-51.
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
16
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
October
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003, pp. 62-72.
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
17
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
21
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
Apr
-
J. Newsome, R. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis and defenses," in Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004), Apr 2004.
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
-
-
Newsome, J.1
Shi, R.2
Song, D.3
Perrig, A.4
-
22
-
-
84982836904
-
Efficient security mechanisms for routing protocols
-
February
-
Y. Hu, A. Perrig, and D. V. Johnson, "Efficient security mechanisms for routing protocols," in Proceedings of the 10th Annual Network and Distributed System Security Symposium, February 2003, pp. 57-73.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
, pp. 57-73
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.V.3
|