-
1
-
-
0037086890
-
Wireless Sensor Networks: A Survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless Sensor Networks: A Survey, Computer Networks 38(4), 393-422 (2002).
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0012979825
-
A Taxonomy of Wireless Microsensor Network Models
-
S. Tilak, N.B. Abu-Ghazaleh, and W. Heinzelman, A Taxonomy of Wireless Microsensor Network Models, ACM Mobile Computing and Comm. Rev. 6(2), 1-8 (2002).
-
(2002)
ACM Mobile Computing and Comm. Rev
, vol.6
, Issue.2
, pp. 1-8
-
-
Tilak, S.1
Abu-Ghazaleh, N.B.2
Heinzelman, W.3
-
3
-
-
3543105535
-
Combinatorial Optimization of Group Key Management
-
M. Eltoweissy, H. Heydari, L. Morales, and H. Sadborough, Combinatorial Optimization of Group Key Management, J. Network and Systems Management 12(1), 33-50 (2004).
-
(2004)
J. Network and Systems Management
, vol.12
, Issue.1
, pp. 33-50
-
-
Eltoweissy, M.1
Heydari, H.2
Morales, L.3
Sadborough, H.4
-
4
-
-
33845938314
-
An Efficient Key Revocation Protocol for Wireless Sensor Networks, International Workshop on Wireless Mobile Multimedia
-
G. Dini and I.M. Savino, An Efficient Key Revocation Protocol for Wireless Sensor Networks, International Workshop on Wireless Mobile Multimedia, Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, 450-452 (2006).
-
(2006)
Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks
, pp. 450-452
-
-
Dini, G.1
Savino, I.M.2
-
5
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981).
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
6
-
-
33646921841
-
Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks
-
M. Younis, K. Ghumman, and M. Eltoweissy, Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks, IEEE Trans. Parallel and Distrib. Sys. 17(8), 865-882(2006).
-
(2006)
IEEE Trans. Parallel and Distrib. Sys
, vol.17
, Issue.8
, pp. 865-882
-
-
Younis, M.1
Ghumman, K.2
Eltoweissy, M.3
-
8
-
-
10944266504
-
HEED: A Hybrid, Energy-Efficient, Distributed lustering Approach for Ad Hoc Sensor Networks
-
O. Younis and S. Fahmy, HEED: A Hybrid, Energy-Efficient, Distributed lustering Approach for Ad Hoc Sensor Networks, IEEE Trans. Mobile Computing 3(4), 366-379 (2004).
-
(2004)
IEEE Trans. Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
9
-
-
0141509888
-
Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison
-
K. Langendoen and N. Reijers, Distributed Localization in Wireless Sensor Networks: A Quantitative Comparison, Computer Networks 43(4), 499-518 (2003).
-
(2003)
Computer Networks
, vol.43
, Issue.4
, pp. 499-518
-
-
Langendoen, K.1
Reijers, N.2
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. of the ACM 21(2), 120-126 (1978).
-
(1978)
Comm. of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
36649012907
-
The MD5 Message-Digest Algorithm, RFC 1320
-
Data Security Inc
-
R. Rivest, The MD5 Message-Digest Algorithm, RFC 1320, MIT and RSA Data Security Inc., (1992).
-
(1992)
MIT and RSA
-
-
Rivest, R.1
|