-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A survey. In Computer Networks, 38 (4), pages 393-422, 2002.
-
(2002)
Computer Networks, 38 (4)
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Paris, France, Springer-Verlag New York, Inc
-
R. Blom. An optimal class of symmetric key generation systems. In Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, pages 335-338, Paris, France, 1985. Springer-Verlag New York, Inc.
-
(1985)
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: Theory and application of cryptographic techniques
, pp. 335-338
-
-
Blom, R.1
-
4
-
-
0012797660
-
WCA: A Weight Based Clustering Algorithm for mobile ad hoc networks
-
April
-
M. Chatterjee, S. Das, and D. Turgut. WCA: A Weight Based Clustering Algorithm for mobile ad hoc networks. In Journal of Cluster Computing (Special Issue on Mobile Ad hoc Networks), vol. 5, pp. 193-204, April, 2002.
-
(2002)
Journal of Cluster Computing (Special Issue on Mobile Ad hoc Networks)
, vol.5
, pp. 193-204
-
-
Chatterjee, M.1
Das, S.2
Turgut, D.3
-
5
-
-
24944458273
-
Share the Secret: Enabling Location Privacy in Ubiquitous Environments
-
C. Delakouridis, L. Kazatzopoulos, G. F. Marias, and P. Georgiadis. Share the Secret: Enabling Location Privacy in Ubiquitous Environments. In Lecture Notes in Computer Science, volume 3479, pages 289-305, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3479
, pp. 289-305
-
-
Delakouridis, C.1
Kazatzopoulos, L.2
Marias, G.F.3
Georgiadis, P.4
-
6
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili. A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
9
-
-
0242696170
-
ANODR: ANonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks
-
Annapolis, Maryland, USA, ACM Press
-
J. Kong and X. Hong. ANODR: ANonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks. In MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad Hoc networking & computing, pages 291-302, Annapolis, Maryland, USA, 2003. ACM Press.
-
(2003)
MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad Hoc networking & computing
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
11
-
-
33646918131
-
Telos: Enabling Ultra-Low Power Wireless Research
-
Los Angeles, California, USA
-
J. Polastre, R. Szewczyk, and D. Culler. Telos: Enabling Ultra-Low Power Wireless Research. In IPSN/SPOTS '05: Proceedings of the Fourth International Conference on Information Processing in Sensor Networks: Special track on Platform Tools and Design Methods for Network Embedded Sensors, pages 364-369, Los Angeles, California, USA, 2005.
-
(2005)
IPSN/SPOTS '05: Proceedings of the Fourth International Conference on Information Processing in Sensor Networks: Special track on Platform Tools and Design Methods for Network Embedded Sensors
, pp. 364-369
-
-
Polastre, J.1
Szewczyk, R.2
Culler, D.3
-
12
-
-
2442445104
-
A cluster based secure routing scheme for wireless ad hoc networks
-
Phoenix, Arizona
-
R. Poosarla, H. Deng, A. Ojha, and D. P. Agarwal. A cluster based secure routing scheme for wireless ad hoc networks. In IEEE IPCCC, 2004, pages 171-175, Phoenix, Arizona, 2004.
-
(2004)
IEEE IPCCC
, pp. 171-175
-
-
Poosarla, R.1
Deng, H.2
Ojha, A.3
Agarwal, D.P.4
-
13
-
-
22944492132
-
AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol
-
X. Wu and B. K. Bhargava. AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol. In IEEE Trans. Mob. Comput., volume 4, pages 335-348, 2005.
-
(2005)
IEEE Trans. Mob. Comput
, vol.4
, pp. 335-348
-
-
Wu, X.1
Bhargava, B.K.2
-
14
-
-
0037630649
-
PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks
-
F. Ye, G. Zhong, S. Lu, and L. Zhang. PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks. In International Conference on Distributed Computing Systems (ICDCS), pages 28-29, 2003.
-
(2003)
International Conference on Distributed Computing Systems (ICDCS)
, pp. 28-29
-
-
Ye, F.1
Zhong, G.2
Lu, S.3
Zhang, L.4
-
15
-
-
4544285741
-
Distributed clustering in Ad Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach
-
O. Younis and S. Fahmy. Distributed clustering in Ad Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach. In IEEE, INFOCOM 2004, volume 1, pages 629-640, 2004.
-
(2004)
IEEE, INFOCOM 2004
, vol.1
, pp. 629-640
-
-
Younis, O.1
Fahmy, S.2
-
16
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
IEEE Computer Society
-
B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng. Anonymous secure routing in mobile ad-hoc networks. In LCN '04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04), pages 102-108. IEEE Computer Society, 2004.
-
(2004)
LCN '04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN'04)
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
-
17
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington D.C, USA, ACM Press
-
S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and Communications Security, pages 62-72, Washington D.C., USA, 2003. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
18
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks. In IEEE Symposium on Security and Privacy, pages 259-274, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 259-274
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|