-
1
-
-
84891797725
-
-
Tinyos website. http://webs.cs.berkeley.edu/tos/.
-
Tinyos Website
-
-
-
2
-
-
1542317087
-
Mantis: System support for multimodal networks of in-situ sensors
-
San Diego, CA, USA, September
-
H. Abrach, S. Bhatti, J. Carlson, H. Dui, J. Rose, A. Sheth, B. Shucker, J. Deng, and R. Han. Mantis: System support for multimodal networks of in-situ sensors. In (WSNA'03), San Diego, CA, USA, September 2003.
-
(2003)
WSNA'03
-
-
Abrach, H.1
Bhatti, S.2
Carlson, J.3
Dui, H.4
Rose, J.5
Sheth, A.6
Shucker, B.7
Deng, J.8
Han, R.9
-
3
-
-
4544319085
-
-
U. A. F. ARGUS Advanced Remote Ground Unattended Sensor Systems, Department of Defense. Argus
-
U. A. F. ARGUS Advanced Remote Ground Unattended Sensor Systems, Department of Defense. Argus. http://www.globalsecurity.org/intell/systems/ arguss.htm.
-
-
-
-
4
-
-
3943055289
-
An intrusion tolerant security server for an open distributed system
-
Toulouse, France
-
L. Blain and Y. Deswarte. An intrusion tolerant security server for an open distributed system. In 1st European Symposium in Computer Security, Toulouse, France 1990.
-
(1990)
1st European Symposium in Computer Security
-
-
Blain, L.1
Deswarte, Y.2
-
6
-
-
84944457899
-
Rapid prototyping of mobile input devices using wireless sensor nodes
-
Monterey, California, USA, October
-
J. Carlson, R. Han, and et.al. Rapid prototyping of mobile input devices using wireless sensor nodes. In WMCSA'03, Monterey, California, USA, October 2003.
-
(2003)
WMCSA'03
-
-
Carlson, J.1
Han, R.2
-
8
-
-
4243199653
-
The performance evaluation of intrusion-tolerant routing in wireless sensor networks
-
Palo Alto, CA, USA, April
-
J. Deng, R. Han, and S. Mishra. The performance evaluation of intrusion-tolerant routing in wireless sensor networks. In IPSN'03, Palo Alto, CA, USA, April 2003.
-
(2003)
IPSN'03
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
9
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington D.C, USA, October
-
W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In 10th ACM Conference on Computer and Communications Security (CCS'03), Washington D.C, USA, October 2003.
-
(2003)
10th ACM Conference on Computer and Communications Security (CCS'03)
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
11
-
-
0022564904
-
Intrusion-tolerance using fine-grain fragmentation-scattering
-
Oakland, CA, USA, April
-
J.-M. Fray, Y. Deswarte, and D. Powell. Intrusion-tolerance using fine-grain fragmentation-scattering. In 1986 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 1986.
-
(1986)
1986 IEEE Symposium on Security and Privacy
-
-
Fray, J.-M.1
Deswarte, Y.2
Powell, D.3
-
12
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
February
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of ACM, 42(2), February 1999.
-
(1999)
Communications of ACM
, vol.42
, Issue.2
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
13
-
-
0034445661
-
System architecture directions for network sensors
-
Cambridge, MA, USA, November
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Cullar, and K. Pister. System architecture directions for network sensors. In Nineth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'00), Cambridge, MA, USA, November 2000.
-
(2000)
Nineth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'00)
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Cullar, D.5
Pister, K.6
-
14
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, CA, USA, September
-
Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In 2nd ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, USA, September 2003.
-
(2003)
2nd ACM Workshop on Wireless Security (WiSe'03)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
15
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
September
-
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), September 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
-
-
Karlof, C.1
Wagner, D.2
-
16
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washingon D.C, USA, October
-
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS'03, Washingon D.C, USA, October 2003.
-
(2003)
CCS'03
-
-
Liu, D.1
Ning, P.2
-
17
-
-
84978428047
-
Tag: A tiny aggregation service for ad-hoc sensor networks
-
Boston, MA, December
-
S. Madden, M. Franklin, J. Hellerstein, and W. Hong. Tag: a tiny aggregation service for ad-hoc sensor networks. In 5th Symposium on operating systems design and implementation (OSDI'02), Boston, MA, December 2002.
-
(2002)
5th Symposium on Operating Systems Design and Implementation (OSDI'02)
-
-
Madden, S.1
Franklin, M.2
Hellerstein, J.3
Hong, W.4
-
18
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson. Wireless sensor networks for habitat monitoring. In WSNA'02, 2002.
-
(2002)
WSNA'02
-
-
Mainwaring, A.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Anderson, J.5
-
19
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. Spins: Security protocols for sensor networks. Wireless Networks Journal(WINET), 8(5):521-534, September 2002.
-
(2002)
Wireless Networks Journal(WINET)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
20
-
-
0036930216
-
Quantifying the cost of providing intrusion tolerance in group communication systems
-
Washington D.C, USA, June
-
H. V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, and W. H. Sanders. Quantifying the cost of providing intrusion tolerance in group communication systems. In DSN'02, Washington D.C, USA, June 2002.
-
(2002)
DSN'02
-
-
Ramasamy, H.V.1
Pandey, P.2
Lyons, J.3
Cukier, M.4
Sanders, W.H.5
-
21
-
-
0036929535
-
Developing a heterogeneous intrusion tolerant corba system
-
Washington D.C, USA, June
-
D. Sames, B. Matt, B. Niebuhr, G. Tally, B. Whitmore, and D. Bakken. Developing a heterogeneous intrusion tolerant corba system. In DSN'02, Washington D.C, USA, June 2002.
-
(2002)
DSN'02
-
-
Sames, D.1
Matt, B.2
Niebuhr, B.3
Tally, G.4
Whitmore, B.5
Bakken, D.6
-
22
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. Wood and J. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
23
-
-
85084160265
-
Building intrusion tolerant applications
-
Washington D.C, USA, August
-
T. J. Wu, M. MalKin, and D. Boneh. Building intrusion tolerant applications. In 8th USENIX Security Symposium, pages 79-91, Washington D.C, USA, August 1999.
-
(1999)
8th USENIX Security Symposium
, pp. 79-91
-
-
Wu, T.J.1
Malkin, M.2
Boneh, D.3
|