-
1
-
-
0036688074
-
A survey on sensor networks
-
August
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, pp. 102-114, August 2002.
-
(2002)
IEEE Communications Magazine
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
33845493434
-
Critical power for asymptotic connectivity in wireless networks
-
P. Gupta and P. Kumar, "Critical power for asymptotic connectivity in wireless networks," Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming, W.M. McEneaney, G. Yin and Q. Zhang (Eds.), 1998.
-
(1998)
Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming, W.M. McEneaney, G. Yin and Q. Zhang (Eds.)
-
-
Gupta, P.1
Kumar, P.2
-
4
-
-
1042289031
-
The number of neighbors needed for connectivity of wireless networks
-
F. Xue and P. R. Kumar, "The number of neighbors needed for connectivity of wireless networks," Wireless Networks 10(2), pp. 169-181, 2004.
-
(2004)
Wireless Networks
, vol.10
, Issue.2
, pp. 169-181
-
-
Xue, F.1
Kumar, P.R.2
-
5
-
-
20344370962
-
On connectivity properties of large-scale sensor networks
-
H. Pishro-Nik, K. S. Chan, and F. Fekri, "On connectivity properties of large-scale sensor networks," Proceedings of the First Annual IEEE Communications Society on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON), pp. 498-507, 2004.
-
(2004)
Proceedings of the First Annual IEEE Communications Society on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON)
, pp. 498-507
-
-
Pishro-Nik, H.1
Chan, K.S.2
Fekri, F.3
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," 2003 IEEE Symposium on Security and Privacy, p. 197, 2003.
-
(2003)
2003 IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis and defenses," Third International Symposium on Information Processing in Sensor Networks (IPSN), 2004.
-
(2004)
Third International Symposium on Information Processing in Sensor Networks (IPSN)
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
13
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," Sixth annual ACM/IEEE Internation Conference on Mobile Computing and Networking, pp. 225-265, 2000.
-
(2000)
Sixth annual ACM/IEEE Internation Conference on Mobile Computing and Networking
, pp. 225-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
14
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: security protocols for sensor networks," Mobile Computing and Networking, pp. 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
16
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
July-September
-
H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Transactions on Dependable and Secure Computing 2, pp. 233-347, July-September 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, pp. 233-347
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
|