-
1
-
-
0001853125
-
The Computer for the 21st Century
-
Weiser, M.: The Computer for the 21st Century. Scientific American, 265(3), (1991) 94-104
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
2
-
-
0037086890
-
Wireless sensor networks: A survey. Computer Networks, Elsevier
-
Akyildiz, I. F., Su, W., Sankarasubrarnanian, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks, Elsevier Science, 38(4), (2002) 393-422
-
(2002)
Science
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubrarnanian, Y.3
Cayirci, E.4
-
3
-
-
38649137483
-
-
Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.: A Taxonomy of Wireless Micro-sensor Network Models. ACM Mobile Computing and Communications Review (MC2R 2002), 6(2), (2002) 28-36
-
Tilak, S., Abu-Ghazaleh, N., Heinzelman, W.: A Taxonomy of Wireless Micro-sensor Network Models. ACM Mobile Computing and Communications Review (MC2R 2002), 6(2), (2002) 28-36
-
-
-
-
4
-
-
17644388294
-
Trusted computing platforms, the next security solution
-
Technical Report HPL-2002-221, HP Laboratories
-
Pearson, S.: Trusted computing platforms, the next security solution. Technical Report HPL-2002-221, HP Laboratories (2002)
-
(2002)
-
-
Pearson, S.1
-
5
-
-
24944540791
-
On the Security of Wireless Sensor Networks
-
Singapore
-
Roman, R., Zhou, J., Lopez, J.: On the Security of Wireless Sensor Networks. Computational Science and Its Applications - ICCSA 2005, Singapore, (2005) 681-690
-
(2005)
Computational Science and Its Applications - ICCSA 2005
, pp. 681-690
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
6
-
-
17444366210
-
Training a wireless sensor network
-
Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M., Jones, K.: Training a wireless sensor network. Mobile Networks and Applications, v.10n. 1-2, (2005) 151-168
-
(2005)
Mobile Networks and Applications
, vol.10 n
, Issue.151-168
, pp. 1-2
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Eltoweissy, M.4
Jones, K.5
-
7
-
-
39049083533
-
-
Delgosha, F., Fekri, F.: Threshold key-establishment in distributed sensor networks using a multivariate scheme. Accepted for presentation at INFOCOM 2006, http://users.ece.gatech.edu/~farshid/infocom06.pdf (2006)
-
Delgosha, F., Fekri, F.: Threshold key-establishment in distributed sensor networks using a multivariate scheme. Accepted for presentation at INFOCOM 2006, http://users.ece.gatech.edu/~farshid/infocom06.pdf (2006)
-
-
-
-
8
-
-
24144503356
-
-
Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. Lecture Notes in Computer Science 3357 (SAC 2004). Springer Berlin / Heidelberg (2004) 294-307
-
Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. Lecture Notes in Computer Science Vol. 3357 (SAC 2004). Springer Berlin / Heidelberg (2004) 294-307
-
-
-
-
9
-
-
33748959977
-
-
at INFOCOM 2006, 2006
-
Traynor, P., Choi, H., Cao, G., Zhu, S., Porta, T. L.: Establishing pair-wise keys in heterogeneous sensor networks. Accepted for presentation at INFOCOM 2006, http://www.cse.psu.edu/~traynor/papers/infocom06.pdf, (2006)
-
Establishing pair-wise keys in heterogeneous sensor networks. Accepted for presentation
-
-
Traynor, P.1
Choi, H.2
Cao, G.3
Zhu, S.4
Porta, T.L.5
-
11
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks, in IEEE Symposium on Security and Privacy, (2003) 197-213
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
13
-
-
33745312679
-
Efficient mechanisms for secure internode and aggregation processing in sensor networks
-
October
-
T. Dimitriou, "Efficient mechanisms for secure internode and aggregation processing in sensor networks," in Proceedings of Ad-Hoc, Mobile, and Wireless Networks: 4th International Conference (ADHOC-NOW 2005), pp. 18-31, October 2005.
-
(2005)
Proceedings of Ad-Hoc, Mobile, and Wireless Networks: 4th International Conference (ADHOC-NOW
, pp. 18-31
-
-
Dimitriou, T.1
-
14
-
-
0024012644
-
An introduction to contemporary cryptology
-
Massey, J. L.: An introduction to contemporary cryptology. in Proceedings of the IEEE, vol. 76, no. 5, (1988) 533-549
-
(1988)
Proceedings of the IEEE
, vol.76
, Issue.5
, pp. 533-549
-
-
Massey, J.L.1
-
15
-
-
38649107569
-
-
http://www.st.com/stonline/products/families/smartcard/index.htm (2006)
-
(2006)
-
-
-
16
-
-
38649135600
-
-
http://www.atmel.eom/products/SecureAVR/overview.asp (2006)
-
(2006)
-
-
-
18
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
Estrin, D., Govindan, R., Heidemann, J. S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking (1999) 263-270
-
(1999)
Mobile Computing and Networking
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.S.3
Kumar, S.4
-
19
-
-
4243082091
-
Security in wireless sensor networks
-
Adrian, P., John, S., David, W.: Security in wireless sensor networks. ACM Communication, vol. 47, (2004) 53-57
-
(2004)
ACM Communication
, vol.47
, pp. 53-57
-
-
Adrian, P.1
John, S.2
David, W.3
-
20
-
-
38649126380
-
-
http://www.wsn.org.cn, 2006
-
(2006)
-
-
|