-
1
-
-
0036983290
-
GHT: A Geographic Hash Table for Data-Centric Storage
-
September
-
S. RatNasamy, B. karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, "GHT: A Geographic Hash Table for Data-Centric Storage," ACM International Workshop on Wireless Sensor Networks and Applications, September 2002.
-
(2002)
ACM International Workshop on Wireless Sensor Networks and Applications
-
-
RatNasamy, S.1
karp, B.2
Yin, L.3
Yu, F.4
Estrin, D.5
Govindan, R.6
Shenker, S.7
-
2
-
-
3042608115
-
Data-centric storage in sensornets
-
S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin, "Data-centric storage in sensornets," ACM SIGCOMM Computer Communication Review archive, vol. 33, no. 1, pp. 137-142, 2003.
-
(2003)
ACM SIGCOMM Computer Communication Review archive
, vol.33
, Issue.1
, pp. 137-142
-
-
Shenker, S.1
Ratnasamy, S.2
Karp, B.3
Govindan, R.4
Estrin, D.5
-
3
-
-
85024293703
-
Multi-resolution Storage and Search in Sensor Networks
-
August
-
D. Ganesan, B. Greenstein, D. Perelyubskiy, D. Estrin and J. Heidemann, "Multi-resolution Storage and Search in Sensor Networks," ACM Transactions on Storage, August 2005.
-
(2005)
ACM Transactions on Storage
-
-
Ganesan, D.1
Greenstein, B.2
Perelyubskiy, D.3
Estrin, D.4
Heidemann, J.5
-
4
-
-
84943517831
-
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
-
November
-
W. Zhang, G. Cao, and T. La Porta, "Data Dissemination with Ring-Based Index for Wireless Sensor Networks," IEEE International Conference on Network Protocols (ICNP), pp. 305-314, November 2003.
-
(2003)
IEEE International Conference on Network Protocols (ICNP)
, pp. 305-314
-
-
Zhang, W.1
Cao, G.2
La Porta, T.3
-
5
-
-
0034547115
-
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
-
B. Karp and H. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," ACM Mobicom, 2000.
-
(2000)
ACM Mobicom
-
-
Karp, B.1
Kung, H.2
-
6
-
-
4243082091
-
Security in Wireless Sensor Networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Communications of the ACM, vol. 47, no. 6, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
7
-
-
33847255502
-
A practical study of transitory master key establishment for wireless sensor networks
-
J. Deng, C. Hartung, R. Han, and S. Mishra, "A practical study of transitory master key establishment for wireless sensor networks," in IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2005, pp. 289-299.
-
(2005)
IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm)
, pp. 289-299
-
-
Deng, J.1
Hartung, C.2
Han, R.3
Mishra, S.4
-
8
-
-
0034771605
-
Spins: Security protocols for sensor netowrks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "Spins: security protocols for sensor netowrks," in ACM Mobicom, 2001.
-
(2001)
ACM Mobicom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
9
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), 2003, pp. 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
10
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
-
11
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: Efficient security mechanisms for large-scale distributed sensor networks," in ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
12
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
Feb
-
Y. Zhang,W. Liu, W. Lou, and Y. Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE Journal on Selected Areas in Communications, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
13
-
-
33847130828
-
Toward resilient security in wireless sensor networks
-
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, and William Arbaugh, "Toward resilient security in wireless sensor networks," in ACM MOBIHOC, 2005.
-
(2005)
ACM MOBIHOC
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
14
-
-
25844473466
-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach
-
March
-
W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach," IEEE INFOCOM, March 2005.
-
(2005)
IEEE INFOCOM
-
-
Zhang, W.1
Cao, G.2
-
17
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M. Reiter and A. Rubin, "Crowds: Anonymity for web transactions," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
18
-
-
0041165532
-
Euclidean steiner minimum trees: An improved exact algorithm
-
Pawel Winter and Martin Zachariasen, "Euclidean steiner minimum trees: An improved exact algorithm.," Networks, vol. 30, no. 3, pp. 149-166, 1997.
-
(1997)
Networks
, vol.30
, Issue.3
, pp. 149-166
-
-
Winter, P.1
Zachariasen, M.2
-
19
-
-
0014814325
-
Space/Time Trade-offs in Hash Coding with Allowable Errors
-
B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of the ACM, 1970.
-
(1970)
Communications of the ACM
-
-
Bloom, B.1
-
20
-
-
34548365805
-
-
The tinydb project
-
"The tinydb project," http://telegraph.cs.berkeley.edu/tinydb/.
-
-
-
-
21
-
-
0242303658
-
On the complexity of graph tree partition problems
-
Roberto Cordone and Francesco Maffioli, "On the complexity of graph tree partition problems," Discrete Appl. Math., vol. 134, no. 1-3, pp. 51-65, 2004.
-
(2004)
Discrete Appl. Math
, vol.134
, Issue.1-3
, pp. 51-65
-
-
Cordone, R.1
Maffioli, F.2
-
22
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
G. Myles, A. Friday, and N. Davies, "Preserving privacy in environments with location-based applications," in IEEE Pervasive Computing, 2003.
-
(2003)
IEEE Pervasive Computing
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
24
-
-
85092924851
-
Privacy-aware location sensor networks
-
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, "Privacy-aware location sensor networks," in Proceedings of 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
-
(2003)
Proceedings of 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX)
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
25
-
-
85116486060
-
Location-aided Routing in Mobile Ad Hoc Networks
-
Y. Ko and N. Vaidya, "Location-aided Routing in Mobile Ad Hoc Networks," ACM Mobicom, pp. 66-75, 1998.
-
(1998)
ACM Mobicom
, pp. 66-75
-
-
Ko, Y.1
Vaidya, N.2
-
26
-
-
1542358974
-
Trajectory Based Forwarding and Its Applications
-
D. Niculescu and B. Nath, "Trajectory Based Forwarding and Its Applications," ACM MOBICOM, 2003.
-
(2003)
ACM MOBICOM
-
-
Niculescu, D.1
Nath, B.2
|