-
1
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewozyk, J. D. Tygar, V. Wen, and D. Culler, "SPINS: Security Protocols for Sensor Networks", Wireless Networks, 8:521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewozyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.5
-
2
-
-
4143071267
-
-
[Online], and http://www.xbow.com/Products/Wireless_Sensor_Networks.html
-
Networked Embedded Systems Technology research at University of California, Berkeley [Online], Available: http://webs.cs.berkeley.edu/nest- index.html and http://www.xbow.com/Products/Wireless_Sensor_Networks.html.
-
-
-
-
3
-
-
0003508570
-
-
U.S. Department Of Commerce, U.S.A
-
National Institute of Standards and Technology, "Data Encryption Standard (DES)," U.S. Department Of Commerce, U.S.A, 1999.
-
(1999)
Data Encryption Standard (DES)
-
-
-
7
-
-
0003855464
-
-
John Wiley & Sons
-
nd Edition, John Wiley & Sons, 1996, pp:518-520
-
(1996)
nd Edition
, pp. 518-520
-
-
Schneier, B.1
-
8
-
-
0003855464
-
-
John Wiley & Sons, Chapter 18
-
nd Edition, John Wiley & Sons, 1996, Chapter 18
-
(1996)
nd Edition
-
-
Schneier, B.1
-
9
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
August Boston, Massachusetts
-
C. Intanagonwiwat, R. Govindan and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks", In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCOM '00), August 2000, Boston, Massachusetts.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCOM '00)
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
11
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
L. Eschenauer, V. D. Gligor, "A key-management scheme for distributed sensor networks", In Proceedings of the 9th ACM conference on Computer and communications security 2002, Washington, DC, USA, pp: 41-47.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
12
-
-
1542267055
-
Assessing security-critical energy-efficient sensor networks
-
Department of Computer Science, Jul
-
Y.W. Law, S. Dulman, S. Etalle and P. Havinga, "Assessing Security-Critical Energy-Efficient Sensor Networks", Department of Computer Science, University of Twente, Technical Report TR-CTIT-02-18, Jul 2002.
-
(2002)
University of Twente, Technical Report
, vol.TR-CTIT-02-18
-
-
Law, Y.W.1
Dulman, S.2
Etalle, S.3
Havinga, P.4
-
14
-
-
84871442641
-
On communication security in wireless ad-hoc sensor network
-
June 10-12, Pittsburgh, Pennsylvania, USA
-
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, M. B. Srivastava, "On communication Security in Wireless Ad-Hoc Sensor Network", In Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02) June ieee10-12, 2002 Pittsburgh, Pennsylvania, USA.
-
(2002)
Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02)
-
-
Slijepcevic, S.1
Potkonjak, M.2
Tsiatsis, V.3
Zimbeck, S.4
Srivastava, M.B.5
-
15
-
-
44649084087
-
Design space exploration for energy-efficient secure sensor network
-
July 17-19, San Jose, California
-
L. Yuan, G. Qu, "Design Space Exploration for Energy-Efficient Secure Sensor Network", The IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP'02) July 17-19, 2002 San Jose, California.
-
(2002)
The IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP'02)
-
-
Yuan, L.1
Qu, G.2
|