-
1
-
-
0001989185
-
A new family of authentication protocols
-
October
-
R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. M anifavas, and R. Needham. A new family of authentication protocols. ACM Operating Systems Review, 32(4):9-20, October 1998.
-
(1998)
ACM Operating Systems Review
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.4
anifavas, C.M.5
Needham, R.6
-
2
-
-
84880889946
-
Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks
-
Technical Report CMU-CS-04-187, School of Computer Science, Carnegie Mellon University, December
-
A.Seshadri, M.Luk, A.Perrig, L. van Doom, and P.Khosla. Using FIRE and ICE for detecting and recovering compromised nodes in sensor networks. Technical Report CMU-CS-04-187, School of Computer Science, Carnegie Mellon University, December 2004.
-
(2004)
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
van Doom, L.4
Khosla, P.5
-
6
-
-
85002390908
-
Reflection as a mechanism for software integrity verification
-
February
-
D.Spinellis. Reflection as a mechanism for software integrity verification. ACM Transactions on Information and System Security, 3(1):51-62, February 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.1
, pp. 51-62
-
-
Spinellis, D.1
-
12
-
-
23944446897
-
New cryptographic primitives based on multiword t-functions
-
February
-
A. Klimov and A. Shamir. New cryptographic primitives based on multiword t-functions. In Fast Software Encryption, February 2004.
-
(2004)
Fast Software Encryption
-
-
Klimov, A.1
Shamir, A.2
-
13
-
-
85031131407
-
The emergence of networking abstractions and techniques in TinyOS
-
March
-
P. Levis, S. Madden, D. Gay, J. Polastre, R. Szewczyk, A. Woo, E. Brewer, and D. Culler. The emergence of networking abstractions and techniques in TinyOS. In Proceedings of Symposium, on Networked Systems Design and Implementation (NSDI), March 2004.
-
(2004)
Proceedings of Symposium, on Networked Systems Design and Implementation (NSDI)
-
-
Levis, P.1
Madden, S.2
Gay, D.3
Polastre, J.4
Szewczyk, R.5
Woo, A.6
Brewer, E.7
Culler, D.8
-
17
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
M.Shaneck, K.Mahadevan, V.Kher, and Y.Kim. Remote software-based attestation for wireless sensors. In ESAS, pages 27-41, 2005.
-
(2005)
ESAS
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
18
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Conference on Mobile Computing and Networks (MobiCom), July 2001.
-
(2001)
Proceedings of Conference on Mobile Computing and Networks (MobiCom)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
October
-
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doom, and Pradeep Khosla. Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms. In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), pages 1-15, October 2005.
-
(2005)
Proceedings of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-15
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
van Doom, L.5
Khosla, P.6
-
21
-
-
6444242510
-
A remote code update mechanism for wireless sensor networks
-
Technical Report CENS-TR-30, UCLA-CENS, November
-
T. Stathopoulos, J. Heidemann, and D. Estrin. A remote code update mechanism for wireless sensor networks. Technical Report CENS-TR-30, UCLA-CENS, November 2003.
-
(2003)
-
-
Stathopoulos, T.1
Heidemann, J.2
Estrin, D.3
-
22
-
-
19944369062
-
Soft tamper-proofing via program integrity verification in wireless sensor networks
-
May/June
-
T.Park and K.Shin. Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Transactions on Mobile Computing, 4(3), May/June 2005.
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.3
-
-
Park, T.1
Shin, K.2
|