-
2
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," in ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Eschenauer, L.1
Gligor, V.D.2
-
4
-
-
1842643245
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," in IEEE ICNP, 2001.
-
(2001)
IEEE ICNP
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
5
-
-
8344266134
-
Secure pebblenets
-
S. Basagni, K. Herrin, E. Rosti, and D. Bruschi, "Secure Pebblenets," in ACM MOBIHOC, 2001.
-
(2001)
ACM MOBIHOC
-
-
Basagni, S.1
Herrin, K.2
Rosti, E.3
Bruschi, D.4
-
6
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
September
-
D. W. Carman, P. S. Kruus, and B. J. Matt, "Constraints and Approaches for Distributed Sensor Network Security," NAI Labs, Tech. Rep. 00-010, September 2000.
-
(2000)
NAI Labs, Tech. Rep.
, Issue.10
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
7
-
-
2442529460
-
GRAdient broadcast: A robust data delivery protocol for large scale sens or networks
-
March 2005
-
F. Ye, G. Zhong, S. Lu, and L. Zhang, "GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sens or Networks," ACM Wireless Networks (WINET), vol. 11, no. 2, March 2005.
-
ACM Wireless Networks (WINET)
, vol.11
, Issue.2
-
-
Ye, F.1
Zhong, G.2
Lu, S.3
Zhang, L.4
-
8
-
-
0002757750
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Crypto, 1996.
-
(1996)
Crypto
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
10
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of the ACM, vol. 13, no. 7, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
-
-
Bloom, B.1
-
14
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks," in ACM MOBICOM, 2000.
-
(2000)
ACM MOBICOM
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
15
-
-
3042822813
-
A two-tier data dissemination model for large-scale wireless sensor networks
-
F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks," in ACM MOIBCOM, 2002.
-
(2002)
ACM MOIBCOM
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
16
-
-
3042785191
-
Optimizing sensor networks in the energy-latency-density design space
-
C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. B. Srivastava, "Optimizing Sensor Networks In The Energy-Latency-Density Design Space," leee Transactions On Mobile Computing, vol. 1, no. 1, 2002.
-
(2002)
Leee Transactions on Mobile Computing
, vol.1
, Issue.1
-
-
Schurgers, C.1
Tsiatsis, V.2
Ganeriwal, S.3
Srivastava, M.B.4
-
17
-
-
0037630649
-
PEAS: A robust energy conserving protocol for long-lived sensor networks
-
F. Ye, G. Zhong, S. Lu, and L. Zhang, "PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks," in ICDCS, 2003.
-
(2003)
ICDCS
-
-
Ye, F.1
Zhong, G.2
Lu, S.3
Zhang, L.4
-
18
-
-
8344222988
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," in IEEE SPNA, 2002.
-
(2002)
IEEE SPNA
-
-
Karlof, C.1
Wagner, D.2
-
19
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, October 2002.
-
(2002)
IEEE Computer
-
-
Wood, A.1
Stankovic, J.2
-
20
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
S. Slijepsevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. Srivastava, "On Communication Security in Wireless Ad-Hoc Sensor Networks," in 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002.
-
(2002)
11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
-
-
Slijepsevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.5
-
22
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," in INFOCOM, 1999.
-
(1999)
INFOCOM
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
23
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks," in ACM MOBICOM, 2002.
-
(2002)
ACM MOBICOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
25
-
-
0036986441
-
An on-demand routing protocol resilient to byzantine Failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-Demand Routing Protocol Resilient to Byzantine failures," in ACM Workshop on Wireless Security (WiSe), 2002.
-
(2002)
ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
26
-
-
0036980295
-
Self-organized network layer security in mobile ad hoc networks
-
H. Yang, X. Meng, and S. Lu, "Self-organized Network Layer Security in Mobile Ad Hoc Networks," in WiSe, 2002.
-
(2002)
WiSe
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
27
-
-
0345755816
-
Adaptive security for multi-layer ad hoc networks
-
J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, "Adaptive Security for Multi-layer Ad Hoc Networks," Wireless Communications and Mobile Computing, Special Issue on Mobile Ad Hoc Networking, vol. 2, pp. 533-547, 2002.
-
(2002)
Wireless Communications and Mobile Computing, Special Issue on Mobile Ad Hoc Networking
, vol.2
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
29
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," in ACM SIGCOMM, 2001.
-
(2001)
ACM SIGCOMM
-
-
Park, K.1
Lee, H.2
|