-
1
-
-
1542317087
-
MANTIS: System support for multimodal networks of in-situ sensors
-
San Diego, CA, Sep
-
H. Abrach, S. Bhatti, J. Carlson, H. Dui, J. Rose, A. Sheth, B. Shucker, J. Deng, R. Han, "MANTIS: System Support for Multimodal Networks of In-Situ Sensors", In Proc. of 2nd ACM Workshop on Wireless Sensor Networks and Applications (WSNA'03), San Diego, CA, Sep, 2003.
-
(2003)
Proc. of 2nd ACM Workshop on Wireless Sensor Networks and Applications (WSNA'03)
-
-
Abrach, H.1
Bhatti, S.2
Carlson, J.3
Dui, H.4
Rose, J.5
Sheth, A.6
Shucker, B.7
Deng, J.8
Han, R.9
-
3
-
-
4544270326
-
Adaptive and decentralized operator placement for in-network query processing
-
April
-
B.J.Bonfils, P. Bonnet, "Adaptive and Decentralized Operator Placement for In-Network Query Processing", IPSN'03, April, 2003.
-
(2003)
IPSN'03
-
-
Bonfils, B.J.1
Bonnet, P.2
-
4
-
-
0034777649
-
Intercepting Mobile Communications: The Insecurity of 802.11
-
N. Borisov, I. Goldberg, D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", ACM MobiCom 2001, pp. 180-188.
-
ACM MobiCom 2001
, pp. 180-188
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
6
-
-
4544220463
-
-
Cougar Project
-
Cougar Project: http://cougar.cs.cornell.edu
-
-
-
-
9
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington DC, USA, November
-
L. Eschenauer, V.D. Gigor, "A Key-Management Scheme for Distributed Sensor Networks", Conference on Computer and Communications Security, CCS'02, Washington DC, USA, November, 2002.
-
(2002)
Conference on Computer and Communications Security, CCS'02
-
-
Eschenauer, L.1
Gigor, V.D.2
-
10
-
-
0034445661
-
System architecture directions for network sensors
-
Cambridge, November
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Cullar, K. Pister, "System architecture directions for network sensors",ASPLOS 2000, Cambridge, November 2000.
-
(2000)
ASPLOS 2000
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Cullar, D.5
Pister, K.6
-
11
-
-
84982836904
-
Efficient security mechanisms for routing protocols
-
San Diego, CA, February
-
Y.C. Hu, A. Perrig, D.B. Johnson, "Efficient Security Mechanisms for Routing Protocols", In Proc. of the Tenth Annual Network and Distributed System Security Symposium, NDSS'03, San Diego, CA, February 2003.
-
(2003)
Proc. of the Tenth Annual Network and Distributed System Security Symposium, NDSS'03
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, CA, Sep
-
Y.C. Hu, A. Perrig, D.B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols", In Proc. of 2nd ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, Sep, 2003.
-
(2003)
Proc. of 2nd ACM Workshop on Wireless Security (WiSe'03)
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
0034539015
-
Directed diffusion: A scalable and robuts communication paradigm for sensor networks
-
August, USA
-
C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed Diffusion: A Scalable and Robuts Communication Paradigm for Sensor Networks," 6th Conf. on Mobile Computing and Networking, August, 2000, USA.
-
(2000)
6th Conf. on Mobile Computing and Networking
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
15
-
-
0345755816
-
Adaptive security for multi-layer ad hoc networks
-
August
-
J. Kong, H. Luo, K. Xu, D. Gu, M. Gerla and S. Lu, "Adaptive Security for Multi-layer Ad Hoc Networks," Special Issue of Wireless Communications and Mobile Computing". August, 2002.
-
(2002)
Wireless Communications and Mobile Computing
, Issue.SPEC. ISSUE
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.4
Gerla, M.5
Lu, S.6
-
16
-
-
1542376953
-
Computation hierarchy for in-network processing
-
San Diego, CA, Sep
-
R. Kumar, V. Tsiatsis, M. Srivastava, "Computation Hierarchy for In-network Processing", In Proc. of 2nd ACM International Workshop on Wireless Sensor Networks & Applications (WSNA'03), San Diego, CA, Sep, 2003.
-
(2003)
Proc. of 2nd ACM International Workshop on Wireless Sensor Networks & Applications (WSNA'03)
-
-
Kumar, R.1
Tsiatsis, V.2
Srivastava, M.3
-
17
-
-
4243642312
-
Constructing digital signatures from one-way function
-
SRI International, Oct
-
L. Lamport, "Constructing digital signatures from one-way function", technical report SRI-CSL-98, SRI International, Oct 1979.
-
(1979)
Technical Report
, vol.SRI-CSL-98
-
-
Lamport, L.1
-
18
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, "Password Authentication with Insecure Communication", Communication of the ACM, 24:11, Nov 1981.
-
(1981)
Communication of the ACM
, vol.24
, pp. 11
-
-
Lamport, L.1
-
19
-
-
0037445324
-
Collaborative in-network processing for target tracking
-
March
-
J. Liu, J.E. Riech, and F. Zhao, "Collaborative in-network processing for target tracking", EURASIP, Journal on Applied Signal Processing, March, 2003.
-
(2003)
EURASIP, Journal on Applied Signal Processing
-
-
Liu, J.1
Riech, J.E.2
Zhao, F.3
-
20
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
San Diego, California. February
-
D. Liu and P. Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks", The 10th Annual Network and Distributed System Security Symposium. San Diego, California. February 2003.
-
(2003)
The 10th Annual Network and Distributed System Security Symposium
-
-
Liu, D.1
Ning, P.2
-
21
-
-
0141787007
-
Energy-aware secure multicast communication in ad-hoc networks using geographic location information
-
Hong Kong, China, April
-
L. Lazos, R. Poovendran, "Energy-aware secure multicast communication in ad-hoc networks using geographic location information", ICASSP 2003, Hong Kong, China, April 2003.
-
(2003)
ICASSP 2003
-
-
Lazos, L.1
Poovendran, R.2
-
22
-
-
10644296109
-
Self-securing ad hoc wireless networks
-
Italy, July
-
H. Luo, J. Kong, P. Zerfos, S. Lu and L. Zhang, "Self-securing Ad Hoc Wireless Networks," IEEE ISCC 2002, Italy, July 2002.
-
(2002)
IEEE ISCC 2002
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
23
-
-
1542356536
-
-
OSDI, December
-
S. Madden, M. Franklin, J. Hellerstein, and W. Hong. "TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks", OSDI, December 2002.
-
(2002)
TAG: A Tiny Aggregation Service for Ad-hoc Sensor Networks
-
-
Madden, S.1
Franklin, M.2
Hellerstein, J.3
Hong, W.4
-
24
-
-
0034504137
-
MetaCricket: A designer's kit for making computational devices
-
F. Martin, B. Mikhak, and B. Silverman, "MetaCricket: A designer's kit for making computational devices", IBM Systems Journal, vol. 39, 2000.
-
(2000)
IBM Systems Journal
, vol.39
-
-
Martin, F.1
Mikhak, B.2
Silverman, B.3
-
25
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
A. Mainwaring, J. Polastre, R. Szewczyk D. Culler, J. Anderson, "Wireless Sensor Networks for Habitat Monitoring", First ACM Workshop on Wireless Sensor Networks and Applications (WSNA) 2002, pp. 88-97.
-
First ACM Workshop on Wireless Sensor Networks and Applications (WSNA) 2002
, pp. 88-97
-
-
Mainwaring, A.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Anderson, J.5
-
27
-
-
4544274431
-
-
NAI Lab Report, http://www.nai.com/nai_labs/ asp_set/crypto/ crypt_senseit.asp.
-
NAI Lab Report
-
-
-
28
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM 21(12), December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
29
-
-
4544290802
-
-
NS2 web site, http://www.isi.edu/nsnam/ns
-
NS2 Web Site
-
-
-
30
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sep
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, "SPINS: Security Protocols for Sensor Networks", Wireless Networks Journal(WINET), 8(5):521-534, Sep 2002.
-
(2002)
Wireless Networks Journal(WINET)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
31
-
-
4544244334
-
SIA: Secure information aggregation in sensor networks
-
To Appear Los Angeles, CA, Nov
-
B. Przydatek, D. Song and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks", To Appear in ACM SenSys'03, Los Angeles, CA, Nov, 2003.
-
(2003)
ACM SenSys'03
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
32
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
November
-
K. Sanzgiri, B. Dahill, B. Le vine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", In Proc. of 2002 IEEE International Conference on Network Protocols (ICNP). November 2002.
-
(2002)
Proc. of 2002 IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Le Vine, B.3
Shields, C.4
Belding-Royer, E.5
-
34
-
-
4544324229
-
-
TinyOS: http://www.cs.berkeley.edu/tos
-
-
-
-
35
-
-
4544221261
-
-
TinySec: http://www.cs.berkeley.edu/~nks/tinysec/
-
-
-
-
36
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. Wood, J.A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54-62, October 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.A.2
-
37
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks", IEEE Network Magazine, vol. 13, no.6, November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
-
38
-
-
0036929565
-
Secure multicast in wireless networks of mobile hosts: Protocols and issue
-
ACM/Baltzer Mobile networks and applications, December
-
D. Bruschi, E. Rosti, "Secure multicast in wireless networks of mobile hosts: protocols and issue," ACM/Baltzer Mobile networks and applications, special issue on Multipoint Communication in Wireless Mobile Networks, Vol.6, No.7, December 2002.
-
(2002)
Multipoint Communication in Wireless Mobile Networks
, vol.6
, Issue.7 SPEC. ISSUE
-
-
Bruschi, D.1
Rosti, E.2
-
39
-
-
0036949534
-
Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet
-
Oct.
-
P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein, "Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet", ASPLOS-X conference, Oct. 2002.
-
(2002)
ASPLOS-X Conference
-
-
Juang, P.1
Oki, H.2
Wang, Y.3
Martonosi, M.4
Peh, L.5
Rubenstein, D.6
-
40
-
-
0141856271
-
Target classification and localization in habitat monitoring
-
Hong Kong, China, April
-
H. Wang, J. Elson, L. Girod, D. Estrin, and K. Yao, "Target Classification and Localization in Habitat Monitoring", In Proc. of IEEE international Conference on Acoustics, Speech, and Signal Processing(ICASSP 2003), Hong Kong, China, April 2003.
-
(2003)
Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing(ICASSP 2003)
-
-
Wang, H.1
Elson, J.2
Girod, L.3
Estrin, D.4
Yao, K.5
-
41
-
-
84942436231
-
Computing aggregates for monitoring wireless sensor networks
-
Anchorage, AK, USA. May 11
-
Y.J. Zhao, R. Govindan, and D. Estrin, "Computing Aggregates for Monitoring Wireless Sensor Networks", The First IEEE International Workshop on Sensor Network Protocols and Applications (SNPA'03), Anchorage, AK, USA. May 11, 2003
-
(2003)
The First IEEE International Workshop on Sensor Network Protocols and Applications (SNPA'03)
-
-
Zhao, Y.J.1
Govindan, R.2
Estrin, D.3
|