-
2
-
-
4243082091
-
Security in Wireless Sensor Networks
-
June
-
Adrian Perrig, John Stankovic, and David Wagner, "Security in Wireless Sensor Networks," Communications of the ACM, Vol. 47, No. 6, June 2004, pp. 53 - 57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
3
-
-
11144340927
-
Designing Secure Sensor Networks
-
Dec
-
Elaine Shi and Adrian Perrig, "Designing Secure Sensor Networks," IEEE Wireless Communications, Vol. 11, No. 6, Dec. 2004, pp. 38-43.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
4
-
-
33646918331
-
Evaluation of Security Mechanisms in Wireless Sensor Networks
-
Germano Guimaraes, Eduardo Souto, Djamei Sadok, and Judith Kelner, "Evaluation of Security Mechanisms in Wireless Sensor Networks," Proceedings of the 2005 Systems Communications, 2005, pp. 428 - 433.
-
(2005)
Proceedings of the 2005 Systems Communications
, pp. 428-433
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
5
-
-
80053424324
-
Intrusion Detection and Failure Recovery in Sensor Nodes
-
Tagungsband INFORMATIK 2005, Workshop Proceedings, Heidelberg, Germany, September, Springer-Verlag
-
Harald Vogt, Matthias Ringwald, and Mario Strasser, "Intrusion Detection and Failure Recovery in Sensor Nodes," in Tagungsband INFORMATIK 2005, Workshop Proceedings, LNCS, Heidelberg, Germany, September 2005. Springer-Verlag.
-
(2005)
LNCS
-
-
Vogt, H.1
Ringwald, M.2
Strasser, M.3
-
6
-
-
33745639957
-
Node Compromise in Sensor Networks: The Need for Secure Systems
-
Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder
-
Carl Hartung, James Balasalle, and Richard Han, "Node Compromise in Sensor Networks: The Need for Secure Systems," Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado at Boulder.
-
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
7
-
-
1842665110
-
Intrusion Detection in Wireless Ad Hoc Networks
-
Feb
-
Amitabh Mishra, Ketan Nadkami, and Animesh Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, Vol. 11, No. 1, Feb. 2004, pp. 48 - 60.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkami, K.2
Patcha, A.3
-
8
-
-
27944459744
-
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
-
Donggang Liu, Peng Ning, and Wenliang Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) - Volume 0, pp. 609-619, 2005.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)
, vol.0
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
9
-
-
33747302351
-
-
Ilker Onat and land Ali Miri, An Intrusion Detection System for Wireless Sensor Networks, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005, 3, 2005, pp. 253 - 259.
-
Ilker Onat and land Ali Miri, "An Intrusion Detection System for Wireless Sensor Networks," IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005, Vol. 3, 2005, pp. 253 - 259.
-
-
-
-
10
-
-
3042738543
-
SWATT: SoftWare-based attestation for embedded devices
-
Privacy, May 9-12
-
Arvind Seshadri, Adrian Perrig, Leendert van Doom, and Pradeep Khosla, "SWATT: softWare-based attestation for embedded devices," Proceedings of the 2004 IEEE Symposium on Security and Privacy, May 9-12, 2004, pp. 272-282.
-
(2004)
Proceedings of the 2004 IEEE Symposium on Security and
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
van Doom, L.3
Khosla, P.4
|