-
1
-
-
4544285741
-
Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach
-
Hongkong
-
O. Younis and S. Fahmy, "Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach," in Proceedings of IEEE INFOCOM, Hongkong, 2004, pp. 629-640.
-
(2004)
Proceedings of IEEE INFOCOM
, pp. 629-640
-
-
Younis, O.1
Fahmy, S.2
-
3
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY, USA: ACM Press
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2003, pp. 62-72.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
4
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys and Tutorials, vol. 8, no. 2, 2006.
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, Issue.2
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
6
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
Hongkong
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," in Proceedings of IEEE INFOCOM, Hongkong, 2004.
-
(2004)
Proceedings of IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
7
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
Oakland, CA, USA, May
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2004, pp. 259-271.
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
8
-
-
38549106574
-
A proposal of secure group communication for wireless sensor networks
-
Tokyo, Japan, Dec
-
N. Thepvilojanapong, Y. Tobe, and K. Sezaki, "A proposal of secure group communication for wireless sensor networks," in The 23th Computer Security (CSEC) Group Meeting, IPSJ, Tokyo, Japan, Dec. 2003, pp. 47-52.
-
(2003)
The 23th Computer Security (CSEC) Group Meeting, IPSJ
, pp. 47-52
-
-
Thepvilojanapong, N.1
Tobe, Y.2
Sezaki, K.3
-
9
-
-
14344254253
-
A secure hierarchical model for sensor network
-
M. Tubaishat, J. Yin, B. Panja, and S. Madria, "A secure hierarchical model for sensor network," SIGMOD Rec., vol. 33, no. 1, pp. 7-13, 2004.
-
(2004)
SIGMOD Rec
, vol.33
, Issue.1
, pp. 7-13
-
-
Tubaishat, M.1
Yin, J.2
Panja, B.3
Madria, S.4
-
10
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, 2000.
-
(2000)
IEEE/ACM Trans. Netw
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
12
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
New York, NY, USA: ACM Press
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group communication," in CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 1996, pp. 31-37.
-
(1996)
CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
13
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
New York, NY, USA: ACM Press
-
Y. Kim., A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in CCS '00: Proceedings of the 7th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2000, pp. 235-244.
-
(2000)
CCS '00: Proceedings of the 7th ACM conference on Computer and communications security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
14
-
-
84943243577
-
LKHW: A directed Diffusion-Based secure multicast scheme for wireless sensor networks
-
IEEE Computer Society Press
-
R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. J. M. Havinga, "LKHW: A directed Diffusion-Based secure multicast scheme for wireless sensor networks," in ICPPW '03: Proceedings of the 32nd International Conference on Parallel Processing Workshops. IEEE Computer Society Press, 2003, pp. 397-406.
-
(2003)
ICPPW '03: Proceedings of the 32nd International Conference on Parallel Processing Workshops
, pp. 397-406
-
-
Pietro, R.D.1
Mancini, L.V.2
Law, Y.W.3
Etalle, S.4
Havinga, P.J.M.5
-
15
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
Miami, March 13-17
-
W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach," in Proceedings of IEEE INFOCOM, Miami, March 13-17 2005.
-
(2005)
Proceedings of IEEE INFOCOM
-
-
Zhang, W.1
Cao, G.2
-
16
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
New York, NY, USA: ACM Press
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2002, pp. 41-47.
-
(2002)
CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
17
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
London, UK: Springer-Verlag
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," in CRYPTO '92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 1993, pp. 471-486.
-
(1993)
CRYPTO '92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
18
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
New York, NY, USA: ACM Press
-
D. Liu, P. Ning, and K. Sun, "Efficient self-healing group key distribution with revocation capability," in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2003, pp. 231-240.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 231-240
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
19
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
July
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks," in MobiQuitous '05: Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, July 2005, pp. 118-129.
-
(2005)
MobiQuitous '05: Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 118-129
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
20
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA: ACM Press
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM Press, 2000, pp. 255-265.
-
(2000)
MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
21
-
-
3142751481
-
On supporting distributed collaboration in sensor networks
-
G. Wang, W. Zhang, C. Cao, and T. L. Porta, "On supporting distributed collaboration in sensor networks," in Proceedings of MILCOM, 2003.
-
(2003)
Proceedings of MILCOM
-
-
Wang, G.1
Zhang, W.2
Cao, C.3
Porta, T.L.4
-
22
-
-
38549178457
-
-
Y. Wang and B. Ramamurthy, SENSIM: SEnsor Network SIMulator Version 0.1, August 2006, Online, Available
-
Y. Wang and B. Ramamurthy, "SENSIM: SEnsor Network SIMulator (Version 0.1)," August 2006. [Online]. Available: http://cse.unl.edu/ ~ywang/sensim.htm
-
-
-
|