-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
I.F. Akyildiz, Y. Sankarasubramaniam, W. Su and E. Cayirc, Wireless sensor networks: A survey, Journal of Computer Networks 38 (2002) 393-422.
-
(2002)
Journal of Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Sankarasubramaniam, Y.2
Su, W.3
Cayirc, E.4
-
7
-
-
0035789267
-
-
Long Beach, CA, USA. ACM Press
-
S. Basagni, K. Herrin, D. Bruschi and E. Rosti, Secure pebblenets, in Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, Long Beach, CA, USA (2001) pp. 156-163. ACM Press.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
Pebblenets, S.5
-
8
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Springer-Verlag, editor, Advances in Cryptology: Proceedings of EUROCRYPT '84
-
R. Blom, An optimal class of symmetric key generation systems, in Springer-Verlag, editor, Advances in Cryptology: Proceedings of EUROCRYPT '84, vol. 338 of LNCS (1985).
-
(1985)
LNCS
, vol.338
-
-
Blom, R.1
-
9
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Springer-Verlag, editor, Advances in Cryptology: Proceedings of CRYPTO '92
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly-secure key distribution for dynamic conferences, in Springer-Verlag, editor, Advances in Cryptology: Proceedings of CRYPTO '92, vol. 740 of LNCS (1993).
-
(1993)
LNCS
, vol.740
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
10
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs
-
D.W. Carman, P.S. Kruus and B.J. Matt, Constraints and approaches for distributed sensor network security, Technical Report #00-010, NAI Labs (2000).
-
(2000)
Technical Report #00-010
, Issue.10
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
11
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, California, USA, (11-14, May)
-
H. Chan, A. Perrig and D. Song, random key predistribution schemes for sensor networks, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, (11-14, May 2003) pp. 197-213.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
4644360171
-
Maximum lifetime routing in wireless sensor networks
-
J.-H. Chang and L. Tassiulas, Maximum lifetime routing in wireless sensor networks, IEEE/ACM Trans. Netw., 12(4) (2004) 609-619.
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, Issue.4
, pp. 609-619
-
-
Chang, J.-H.1
Tassiulas, L.2
-
13
-
-
33749633752
-
-
Crossbow Technology Inc., URL: http://www.xbow.com.
-
-
-
-
14
-
-
12444324513
-
Providing secrecy in key management protocols for large wireless sensors networks
-
R. Di Pietro, L.V. Mancini and S. Jajodia, Providing secrecy in key management protocols for large wireless sensors networks, Journal of AdHoc Networks, 1(4) (2003) 455-468.
-
(2003)
Journal of AdHoc Networks
, vol.1
, Issue.4
, pp. 455-468
-
-
Di Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
15
-
-
33749648939
-
Efficient and resilient key discovery based on pseudo-random key pre-deployment
-
April 2004, Santa Fe, New Mexico, USA
-
R. Di Pietro, L.V. Mancini and A. Mei, Efficient and resilient key discovery based on pseudo-random key pre-deployment, in: Proceedings of the IEEE 4th International Workshop on Algorithms for Wireless, Mobile, AdHoc and Sensor Networks (WMAN '04), April 2004, Santa Fe, New Mexico, USA, (2004) pp. 26-30.
-
(2004)
Proceedings of the IEEE 4th International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN '04)
, pp. 26-30
-
-
Di Pietro, R.1
Mancini, L.V.2
Mei, A.3
-
17
-
-
14844295528
-
Connectivity properties of secure wireless sensor networks
-
ACM Press
-
R. Di Pietro, A. Mei, L.V. Mancini, A. Panconesi and J. Radhakrishnan, Connectivity properties of secure wireless sensor networks, in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04), ACM Press (2004) pp. 53-68.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04)
, pp. 53-68
-
-
Di Pietro, R.1
Mei, A.2
Mancini, L.V.3
Panconesi, A.4
Radhakrishnan, J.5
-
18
-
-
33749604627
-
-
PhD thesis, Università "La Sapienza", Dipartimento di Informatica, Roma-Italy (Feb.)
-
R. Di Pietro, Security issues for wireless sensor networks, PhD thesis, Università "La Sapienza", Dipartimento di Informatica, Roma-Italy (Feb. 2004).
-
(2004)
Security Issues for Wireless Sensor Networks
-
-
Di Pietro, R.1
-
21
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Washington D.C., USA (27-31 Oct.)
-
W. Du, J. Deng, Y.S. Han and P.K. Varshney, A pairwise key predistribution scheme for wireless sensor networks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., USA (27-31 Oct. 2003).
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
22
-
-
21844433206
-
Group key management scheme for large-scale wireless sensor network
-
M. Eltoweissy, A. Wadaa, S. Olariu and L. Wilson, Group key management scheme for large-scale wireless sensor network, Journal of Ad-Hoc Networks 3(1) (2005) 668-688.
-
(2005)
Journal of Ad-hoc Networks
, vol.3
, Issue.1
, pp. 668-688
-
-
Eltoweissy, M.1
Wadaa, A.2
Olariu, S.3
Wilson, L.4
-
24
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser and S. Micali, How to construct random functions, Journal of the ACM, 33(4) (1986) 792-807.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
28
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Journal of Adhoc Networks 1(2-3) (2003) 283-315.
-
(2003)
Journal of Adhoc Networks
, vol.1
, Issue.2-3
, pp. 283-315
-
-
Karlof, C.1
Wagner, D.2
-
30
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
February
-
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann and F. Silva, Directed diffusion for Wireless Sensor Networking, IEEE/ACM Trans. Netw., 11(1) (February 2003) 2-16.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
32
-
-
84961616351
-
Supporting aggregate queries over ad-hoc wireless sensor networks
-
Washington D.C., USA
-
S. Madden, R. Szewczyk, Michael J. Franklin and David Culler, Supporting aggregate queries over ad-hoc wireless sensor networks, in: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), Washington D.C., USA (2002) pp. 43-58.
-
(2002)
Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02)
, pp. 43-58
-
-
Madden, S.1
Szewczyk, R.2
Franklin, M.J.3
Culler, D.4
-
33
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B.C. Neuman and T. Tso, Kerberos: An authentication service for computer networks, IEEE Communications Magazine, 32(9) (1994) 33-38.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Tso, T.2
-
34
-
-
4444346335
-
Wireless sensor networks - Leveraging the virtual infrastructure
-
July/Aug.
-
S. Olariu, A. Wadaa, L. Wilson and M. Eltoweissy, Wireless sensor networks - Leveraging the virtual infrastructure, IEEE Network, (July/Aug. 2004) 51-56.
-
(2004)
IEEE Network
, pp. 51-56
-
-
Olariu, S.1
Wadaa, A.2
Wilson, L.3
Eltoweissy, M.4
-
37
-
-
84943553152
-
Establishing pair-wise keys for ad hoc networking: A probabilistic approach
-
IEEE Computer Society, Atlanta, Georgia, USA (4-7 November)
-
S. Zhu, S. Xu, S. Setia and S. Jajodia, Establishing pair-wise keys for ad hoc networking: A probabilistic approach, in Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP'03), IEEE Computer Society, Atlanta, Georgia, USA (4-7 November 2003) 326-335.
-
(2003)
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP'03)
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
38
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
ACM Press, New York, NY, USA
-
S. Zhu, S. Xu, S. Setia and S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), ACM Press, New York, NY, USA (2003) pp. 62-72.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
, pp. 62-72
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|