-
1
-
-
0034771605
-
Spins: Security protocols for sensor netowrks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "Spins: security protocols for sensor netowrks," in Proceedings of ACM Mobile Computing and Networking (Mobicom'01), 2001, pp. 189-199.
-
(2001)
Proceedings of ACM Mobile Computing and Networking (Mobicom'01)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
2
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: Efficient security mechanisms for large-scale distributed sensor networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), 2003, pp. 62-72.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
3
-
-
0036949025
-
A Two-Tier Data Dissemination Model for Large-scale Wireless Sensor Networks
-
September
-
F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-Tier Data Dissemination Model for Large-scale Wireless Sensor Networks," ACM International Conference on Mobile Computing and Networking (MOBICOM'02), pp. 148-159, September 2002.
-
(2002)
ACM International Conference on Mobile Computing and Networking (MOBICOM'02)
, pp. 148-159
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
6
-
-
3042783638
-
A Pairwise Key Pre-distribution Schemes for Wireless Sensor Networks
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key Pre-distribution Schemes for Wireless Sensor Networks," The 10th ACM Conference on Computer and Communications Security, 2003.
-
(2003)
The 10th ACM Conference on Computer and Communications Security
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
8
-
-
85028765277
-
Perfectly-Secure Key Distribution for Dynamic Conferences,
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences," Lecture Notes in Computer Science, vol. 740, pp. 471-486, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
10
-
-
37849005237
-
Probing attacks on tamper resistant devices
-
H. Handschuh, P. Pailer, and J. Stren, "Probing attacks on tamper resistant devices," in Proceedings of Cryptographic Hardware and Embedded Systems, CHES'99, 1999.
-
(1999)
Proceedings of Cryptographic Hardware and Embedded Systems, CHES'99
-
-
Handschuh, H.1
Pailer, P.2
Stren, J.3
-
12
-
-
31344454443
-
On a new way to read data from memory
-
December
-
D. Samyde, S. Skorobogatov, R. Anderson, and J. Quisquater, "On a new way to read data from memory," in Proceedings of First International IEEE Security in Storage Workshop, December 2002.
-
(2002)
Proceedings of First International IEEE Security in Storage Workshop
-
-
Samyde, D.1
Skorobogatov, S.2
Anderson, R.3
Quisquater, J.4
-
13
-
-
84858514690
-
Cotsbots: The mobile mote-based robots
-
"Cotsbots: The mobile mote-based robots," http://www-bsac.eecs. berkeley.edu/projects/cotsbots/.
-
-
-
-
15
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
March
-
W. Du, J. Deng, Y. Han, and S. Chen, "A key management scheme for wireless sensor networks using deployment knowledge," IEEE INFOCOM'04, March 2004.
-
(2004)
IEEE INFOCOM'04
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
-
17
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Mar
-
Haowen Chan and Adrian Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proceedings of IEEE Infocom, Mar. 2005.
-
(2005)
Proceedings of IEEE Infocom
-
-
Chan, H.1
Perrig, A.2
-
18
-
-
84905828907
-
A new approach for establishing pairwise keys for securing wireless sensor networks
-
San Diego, CA, November
-
Arno Wacker, Mirko Knoll, Timo Heiber, and Kurt Rothermel, "A new approach for establishing pairwise keys for securing wireless sensor networks," in Proc. of the 3rd ACM Conference on Embedded Networked Sensor Systems (SenSys), San Diego, CA, November 2005, pp. 27-38.
-
(2005)
Proc. of the 3rd ACM Conference on Embedded Networked Sensor Systems (SenSys)
, pp. 27-38
-
-
Wacker, A.1
Knoll, M.2
Heiber, T.3
Rothermel, K.4
-
20
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
October
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, "Tinypk: Securing sensor networks with public key technology," ACM SASN'04, October 2004.
-
(2004)
ACM SASN'04
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
21
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
March
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), March 2005.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005)
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
22
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
G. Gaubatz, J. Kaps, E. Ozturk and B. Sunar, "State of the art in ultra-low power public key cryptography for wireless sensor networks," PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 146-150, 2005.
-
(2005)
PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.2
Ozturk, E.3
Sunar, B.4
-
24
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
March
-
W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach," IEEE Infocom 2005, March 2005.
-
(2005)
IEEE Infocom 2005
-
-
Zhang, W.1
Cao, G.2
-
25
-
-
37849024577
-
-
Crossbow technology inc
-
"Crossbow technology inc," http://www.xbow.com 2004.
-
(2004)
-
-
-
27
-
-
37849024024
-
-
C. Karlof, N. Sastry, U. Shankar, and D. Wagner, Tinysec: Tinyos link layer security proposal, version 1.0, 2002
-
C. Karlof, N. Sastry, U. Shankar, and D. Wagner, "Tinysec: Tinyos link layer security proposal, version 1.0," 2002.
-
-
-
-
28
-
-
37849030698
-
XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions
-
M. Bellare, R. Guerin, and P. Rogaway, "XOR MACs: New Methods for Message Authentication Using Finite Pseudo-random Functions.," Proc. of Crypto, 1995.
-
(1995)
Proc. of Crypto
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
29
-
-
0034445661
-
System architecture directions for networked sensors
-
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David E. Culler, and Kristofer S. J. Pister, "System architecture directions for networked sensors," in Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
30
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
Baltimore, MD, November
-
V. Shnayder, M. Hempstead, B. Chen, G. Allen, and M. Welsh, "Simulating the power consumption of large-scale sensor network applications," in Proc. of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys), Baltimore, MD, November 2004, pp. 188-200.
-
(2004)
Proc. of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys)
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.3
Allen, G.4
Welsh, M.5
|