-
3
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
In New York, NY, March IEEE
-
Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, and Benny Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proc. IEEE INFOCOM'99, volume 2, pages 708-716, New York, NY, March 1999. IEEE.
-
(1999)
Proc. IEEE INFOCOM'99
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
4
-
-
33845534306
-
-
Crossbow, Inc. MICA2 data sheet. Available at
-
Crossbow, Inc. MICA2 data sheet. Available at http://www.xbow.com/ Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf.
-
-
-
-
7
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
In New York, NY, USA, ACM Press
-
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, and Mani B. Srivastava. Secure time synchronization service for sensor networks. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 97-106, New York, NY, USA, 2005. ACM Press.
-
(2005)
WiSe '05: Proceedings of the 4th ACM Workshop on Wireless Security
, pp. 97-106
-
-
Ganeriwal, S.1
Capkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
8
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
In Kauai, March
-
Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, and Sheueling Chang Shantz. Sizzle: A standards-based end-to-end security architecture for the embedded internet. In Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), Kauai, March 2005.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005)
-
-
Gupta, V.1
Millard, V.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Chang, S.7
Shantz, S.C.8
-
9
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit CPUs
-
In 6th International Workshop, August
-
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz. Comparing elliptic curve cryptography and rsa on 8-bit CPUs. In Cvptographic Hardware and Embedded Systems (CHES); 6th International Workshop, pages 119-132, August 2004.
-
(2004)
Cvptographic Hardware and Embedded Systems (CHES)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
11
-
-
0037295692
-
Directed Diffusion for wireless sensor networking
-
Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva. Directed Diffusion for wireless sensor networking. IEEE/ACMTrans. Netw., 11(1):2-16, 2003.
-
(2003)
IEEE/ACMTrans. Netw.
, vol.11
, Issue.1
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
Silva, F.5
-
13
-
-
33244464429
-
Shawn: A new approach to simulating wireless sensor networks
-
In SpringSim 2005, April
-
A. Kröller, D. Pfisterer, C. Buschmann, S. P. Fekete, and S. Fischer. Shawn: A new approach to simulating wireless sensor networks. In Design, Analysis, and Simulation of Distributed Systems, SpringSim 2005, April 2005.
-
(2005)
Design, Analysis, and Simulation of Distributed Systems
-
-
Kröller, A.1
Pfisterer, D.2
Buschmann, C.3
Fekete, S.P.4
Fischer, S.5
-
14
-
-
1142291591
-
The design of an acquisitional query processor for sensor networks
-
In New York, NY, USA, ACM Press
-
Samuel Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. The design of an acquisitional query processor for sensor networks. In SIGMOD '03: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pages 491-502, New York, NY, USA, 2003. ACM Press.
-
(2003)
SIGMOD '03: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 491-502
-
-
Madden, S.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
15
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
16
-
-
84901201715
-
Telos revision B datasheet
-
moteiv Corp. Available at
-
moteiv Corp. Telos revision B datasheet. Available at http://www.moteiv.com/products/docs/telos-revb-datasheet.pdf.
-
-
-
-
17
-
-
0028479881
-
Connectivity properties of a random radio network
-
August
-
J. Ni and S. Chandler. Connectivity properties of a random radio network. IEE Communications, 141:389-296, August 1994.
-
(1994)
IEE Communications
, vol.141
, pp. 296-389
-
-
Ni, J.1
Chandler, S.2
-
18
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
19
-
-
84948990100
-
The RC5 encryption algorithm
-
Ronald L. Rivest. The RC5 encryption algorithm. In Fast Software Encryption, pages 86-96, 1994.
-
(1994)
Fast Software Encryption
, pp. 86-96
-
-
Rivest, R.L.1
-
20
-
-
24644449780
-
Efficient cooperative signatures: A novel authentication scheme for sensor networks
-
In number 3450 in LNCS April
-
Stefaan Seys and Bart Preneel. Efficient cooperative signatures: A novel authentication scheme for sensor networks. In 2nd International Conference on Security in Pervasive Computing, number 3450 in LNCS, pages 86-100, April 2005.
-
(2005)
2nd International Conference on Security in Pervasive Computing
, pp. 86-100
-
-
Seys, S.1
Preneel, B.2
-
21
-
-
1042289031
-
The number of neighbors needed for connectivity of wireless networks
-
Feng Xue and P. R. Kumar. The number of neighbors needed for connectivity of wireless networks. Wirel. Netw., 10(2): 169-181, 2004.
-
(2004)
Wirel. Netw.
, vol.10
, Issue.2
, pp. 169-181
-
-
Xue, F.1
Kumar, P.R.2
-
22
-
-
84943553152
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
In November
-
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, and Sushil Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In IEEE International Conference on Network Protocols, November 2003.
-
(2003)
IEEE International Conference on Network Protocols
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|