-
1
-
-
13244263673
-
-
Crossbow Technology Inc, Accessed in February 2006
-
Crossbow Technology Inc.: Wireless sensor networks. Accessed in February 2006 http://www.xbow.com/Products/Wireless_Sensor_Networks.htm
-
Wireless sensor networks
-
-
-
2
-
-
38149053551
-
-
Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, U. Colorado at Boulder (January 2005)
-
Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, U. Colorado at Boulder (January 2005)
-
-
-
-
3
-
-
33847150445
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
Zhang, W., Song, H., Zhu, S., Cao, G.: Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks. In: Proceedings of ACM Mobihoc'05 (2005)
-
(2005)
Proceedings of ACM Mobihoc'05
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
4
-
-
33746086383
-
Distributed user access control in sensor networks
-
Gibbons, P.B, Abdelzaher, T, Aspnes, J, Rao, R, eds, DCOSS 2006, Springer, Heidelberg
-
Wang, H., Li, Q.: Distributed user access control in sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, pp. 305-320. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4026
, pp. 305-320
-
-
Wang, H.1
Li, Q.2
-
5
-
-
35048818581
-
-
Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and rsa on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 119-132. Springer, Heidelberg (2004)
-
Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and rsa on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks (July 2001)
-
(2001)
Proceedings of Seventh Annual International Conference on Mobile Computing and Networks (July
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
9
-
-
0042473977
-
Broadcasting in ad hoc networks based on self-pruning
-
Wu, J., Dai, F.: Broadcasting in ad hoc networks based on self-pruning. In: Proceedings of INFOCOM (2003)
-
(2003)
Proceedings of INFOCOM
-
-
Wu, J.1
Dai, F.2
-
11
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197-213 (2003)
-
(2003)
IEEE Symposium on Research in Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
13
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
October
-
Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03) pp. 42-51 (October 2003)
-
(2003)
Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
14
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54-62 (2002)
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
16
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
April
-
Hu, Y., Perrig, A., Johnson, D.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM 2003 (April 2003)
-
(2003)
Proceedings of INFOCOM 2003
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
17
-
-
85163686071
-
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of IEEE Global Communications Conference (GLOBECOM 03) (December 2003)
-
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of IEEE Global Communications Conference (GLOBECOM 03) (December 2003)
-
-
-
-
20
-
-
27644548026
-
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
-
Sun, K., Ning, P., Wang, C.: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE Transactions on Dependable and Secure (TDSC) 2(1), 177-189 (2005)
-
(2005)
IEEE Transactions on Dependable and Secure (TDSC)
, vol.2
, Issue.1
, pp. 177-189
-
-
Sun, K.1
Ning, P.2
Wang, C.3
|