-
1
-
-
3042593365
-
Dependable systems: Whisper: Local secret maintenance in sensor networks
-
V. Naik, A. Arora, S. Bapat, and M. Gouda, "Dependable Systems: Whisper: Local Secret Maintenance in Sensor Networks," IEEE Distributed Systems Online, vol. 4, 2003.
-
(2003)
IEEE Distributed Systems Online
, vol.4
-
-
Naik, V.1
Arora, A.2
Bapat, S.3
Gouda, M.4
-
2
-
-
84961644448
-
Context authentication using constrained channels
-
T. Kindberg, K. Zhang, and N. Shankar, "Context Authentication Using Constrained Channels," Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications (WMCSA), pp. 14-21, 2002.
-
(2002)
Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications (WMCSA)
, pp. 14-21
-
-
Kindberg, T.1
Zhang, K.2
Shankar, N.3
-
3
-
-
1542317849
-
Secure verification of location claims
-
N. Sastry, U. Shankar, and D. Wagner, "Secure Verification of Location Claims," Proc. ACM Workshop Wireless Security, pp. 1-10, 2003.
-
(2003)
Proc. ACM Workshop Wireless Security
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
4
-
-
33751044073
-
Talking to strangers: Authentication in Ad-hoc wireless networks
-
D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proc. Symp. Network and Distributed Systems Security (NDSS '02), 2002.
-
(2002)
Proc. Symp. Network and Distributed Systems Security (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
5
-
-
0013393580
-
Location-based authentication: Grounding cyberspace for better security
-
D.E. Denning and P.J. Denning, eds., ACM Press/Addison-Wesley
-
D.E. Denning and P.P. MacDoran, "Location-Based Authentication: Grounding Cyberspace for Better Security," Internet Besieged: Countering Cyberspace Scofflaws, D.E. Denning and P.J. Denning, eds., pp. 167-174, ACM Press/Addison-Wesley, 1998,
-
(1998)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 167-174
-
-
Denning, D.E.1
MacDoran, P.P.2
-
6
-
-
33751515086
-
-
reprint from, Elsevier Science, Ltd., Feb.
-
reprint from Computer Fraud and Security, Elsevier Science, Ltd., Feb. 1996.
-
(1996)
Computer Fraud and Security
-
-
-
10
-
-
33751545792
-
Secure positioning in wireless networks
-
special issue on security in wireless ad hoc networks, to appear
-
S. Capkun and J.P. Hubaux, "Secure Positioning in Wireless Networks," IEEE J. Selected Areas in Comm., special issue on security in wireless ad hoc networks, to appear.
-
IEEE J. Selected Areas in Comm.
-
-
Capkun, S.1
Hubaux, J.P.2
-
11
-
-
33144472023
-
Rope: Robust position estimation in wireless sensor networks
-
L. Lazos, R. Poovendran, and S. Čapkun, "Rope: Robust Position Estimation in Wireless Sensor Networks," Proc. Int'l Symp. Information Processing in Sensor Networks (IPSN), pp. 324-331, 2005.
-
(2005)
Proc. Int'l Symp. Information Processing in Sensor Networks (IPSN)
, pp. 324-331
-
-
Lazos, L.1
Poovendran, R.2
Čapkun, S.3
-
15
-
-
84871442641
-
On communication security in wireless Ad-hoc sensor networks
-
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M.B. Srivastava, "On Communication Security in Wireless Ad-Hoc Sensor Networks," Proc. 11th IEEE Int'l Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139-144, 2002.
-
(2002)
Proc. 11th IEEE Int'l Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 139-144
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
17
-
-
84860049679
-
-
Tinypk Project
-
Tinypk Project, http://www.is.bbn.com/projects/lws-nest/, 2005.
-
(2005)
-
-
|