-
1
-
-
0036688074
-
A survey on sensor networks
-
August
-
I. F. Akyildiz, Y. S. Weilian Su, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Weilian Su, Y.S.2
Cayirci, E.3
-
3
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Aug
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in Advances in Cryptology-CRYPTO '92, Aug 1992, pp. 471-486.
-
(1992)
Advances in Cryptology-CRYPTO '92
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
IEEE Computer Society
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient aggregation of encrypted data in wireless sensor networks," in MobiQuitous. IEEE Computer Society, 2005, pp. 109-117.
-
(2005)
MobiQuitous
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
6
-
-
4644277168
-
Routing for maximum system lifetime in wireless ad-hoc networks
-
J.-H. Chang and L. Tassiulas, "Routing for maximum system lifetime in wireless ad-hoc networks," in Allerton Conference, 1999.
-
(1999)
Allerton Conference
-
-
Chang, J.-H.1
Tassiulas, L.2
-
7
-
-
0033885342
-
Energy conserving routing in wireless ad-hoc networks
-
_, "Energy conserving routing in wireless ad-hoc networks," in IEEE INFOCOM, 2000, pp. 22-31.
-
(2000)
IEEE INFOCOM
, pp. 22-31
-
-
Chang, J.-H.1
Tassiulas, L.2
-
8
-
-
0004116989
-
-
The MIT Press, September
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms. The MIT Press, September 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
9
-
-
34748926616
-
-
Crossbow technology inc, Online, Available
-
Crossbow technology inc. [Online]. Available: http://www.xbow.com/
-
-
-
-
10
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 5, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.5
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
11
-
-
0031120164
-
Multipoint communication: A survey of protocols, functions, and mechanisms
-
C. Diot, W. Dabbous, and J. Crowcroft, "Multipoint communication: A survey of protocols, functions, and mechanisms," IEEE Journal on Selected Areas in Communications, vol. 15, no. 3, pp. 277-290, 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.3
, pp. 277-290
-
-
Diot, C.1
Dabbous, W.2
Crowcroft, J.3
-
13
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
August
-
C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: a scalable and robust communication paradigm for sensor networks," in 6th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom '00), August 2000, pp. 56-67.
-
(2000)
6th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom '00)
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
15
-
-
33845444069
-
Energy and communication efficient group key management protocol for hierarchical sensor networks
-
IEEE Computer Society
-
B. Panja, S. K. Madria, and B. K. Bhargava, "Energy and communication efficient group key management protocol for hierarchical sensor networks," in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC). IEEE Computer Society, 2006.
-
(2006)
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)
-
-
Panja, B.1
Madria, S.K.2
Bhargava, B.K.3
-
16
-
-
25844467827
-
Maximum lifetime broadcasting in wireless networks
-
J. Park and S. Sahni, "Maximum lifetime broadcasting in wireless networks," IEEE Transactions on Computers, vol. 54, pp. 1081-1090, 2005.
-
(2005)
IEEE Transactions on Computers
, vol.54
, pp. 1081-1090
-
-
Park, J.1
Sahni, S.2
-
19
-
-
0034771605
-
Spins: Security suite for sensor networks
-
New York, July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: Security suite for sensor networks," in Proceedings of the 7th International Conference on Mobile Computing and Networking (MobiCom '01), New York, July 2001.
-
(2001)
Proceedings of the 7th International Conference on Mobile Computing and Networking (MobiCom '01)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
0345565893
-
A survey of key management for secure group communication
-
September
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, pp. 303-329, September 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, pp. 303-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. A. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
22
-
-
34748924701
-
Authenticated flooding in large-scale sensor networks
-
November
-
J.-H. Son, H. Luo, and S.-W. Seo, "Authenticated flooding in large-scale sensor networks." in IEEE MASS, November 2005.
-
(2005)
IEEE MASS
-
-
Son, J.-H.1
Luo, H.2
Seo, S.-W.3
-
23
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
2nd Quarter
-
Y Wang, G. Attenbury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Survey & Tutorials, vol. 8, pp. 2-22, 2nd Quarter 2006.
-
(2006)
IEEE Communications Survey & Tutorials
, vol.8
, pp. 2-22
-
-
Wang, Y.1
Attenbury, G.2
Ramamurthy, B.3
-
24
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
D. Westhoff, J. Girão, and M. Acharya, "Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation," IEEE Transactions on Mobile Computing, vol. 5, no. 10, pp. 1417-1431, 2006.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girão, J.2
Acharya, M.3
-
25
-
-
0036920297
-
Energy- efficient broadcast and multicast trees in wireless networks
-
J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, "Energy- efficient broadcast and multicast trees in wireless networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 481-492, 2002.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 481-492
-
-
Wieselthier, J.E.1
Nguyen, G.D.2
Ephremides, A.3
-
26
-
-
0032178082
-
Secure group communications using key graphs
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," in SIGCOMM, 1998, pp. 68-79.
-
(1998)
SIGCOMM
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
27
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
IEEE
-
W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach," in INFOCOM. IEEE, 2005, pp. 503-514.
-
(2005)
INFOCOM
, pp. 503-514
-
-
Zhang, W.1
Cao, G.2
|