-
2
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
November
-
C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), pages 162-175, November 2004.
-
(2004)
Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
3
-
-
33847097895
-
A New Kind of Session Keys Based on Message Scheme for Sensor Networks
-
China, Dec. 4-7
-
Haiguang Chen, Peng Han, Bo Yu, Chuanshan Gao "A New Kind of Session Keys Based on Message Scheme for Sensor Networks". The Seventeenth Asia Pacific Microwave Conference (APMC 2005) Suzhou, China, Dec. 4-7, 2005
-
(2005)
The Seventeenth Asia Pacific Microwave Conference (APMC 2005) Suzhou
-
-
Chen, H.1
Han, P.2
Yu, B.3
Gao, C.4
-
4
-
-
14844304757
-
TinyPK: Securing Sensor Networks with Public KeyTechnology
-
R. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, P.Kruus. "TinyPK: Securing Sensor Networks with Public KeyTechnology". In second workshop on Security in Sensor and Ad-hoc Networks, 2004.
-
(2004)
second workshop on Security in Sensor and Ad-hoc Networks
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
5
-
-
12444320349
-
-
W. R. Pires, T. H. P. Figueiredo, H. C. Wong, and A. A. F. Loureiro, Malicious node detection in wireless sensor networks, in 18th Int'l Parallel and Distributed Processing Symp, 2004
-
W. R. Pires, T. H. P. Figueiredo, H. C. Wong, and A. A. F. Loureiro, Malicious node detection in wireless sensor networks, in 18th Int'l Parallel and Distributed Processing Symp, 2004
-
-
-
-
6
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar.SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, September 2002.
-
(2002)
Wireless Networks Journal
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
7
-
-
4243199653
-
The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
-
In the, April
-
J. Deng, R. Han and S. Mishra. The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In the Proceedings of IPSN, April, 2003.
-
(2003)
Proceedings of IPSN
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
47349099624
-
-
S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004.
-
S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004.
-
-
-
-
10
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in Proc of IEEE Infocomm 2003.
-
(2003)
Proc of IEEE Infocomm
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
0029700344
-
Decentralized Trust Management
-
Oakland, California, USA
-
M. Blaze, J. Feigenbaum, and J. Lacy. "Decentralized Trust Management". In Proceedings of IEEE Conf. Security and Privacy, Oakland, California, USA, 1996.
-
(1996)
Proceedings of IEEE Conf. Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
14
-
-
47349118795
-
Analysis of a Robust Reputation System for Self-Organized Networks, University of Cambridge
-
January
-
J. Mundinger and J. Le Boudec, Analysis of a Robust Reputation System for Self-Organized Networks, University of Cambridge, Statistical Laboratory Research Report, January 2004.
-
(2004)
Statistical Laboratory Research Report
-
-
Mundinger, J.1
Le Boudec, J.2
-
15
-
-
36949013183
-
-
A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: Distributed Reputationbased Beacon Trust System. In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA, 2006.
-
A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: Distributed Reputationbased Beacon Trust System. In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA, 2006.
-
-
-
-
17
-
-
47349123985
-
-
S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks). Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.
-
S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks). Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.
-
-
-
-
18
-
-
37349084148
-
Reputation-based Trust in Wireless Sensor Networks
-
April 26-28, Seoul, Korea
-
Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao. Reputation-based Trust in Wireless Sensor Networks. 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE2007) pp. 603-607, April 26-28, 2007,Seoul, Korea.
-
(2007)
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE2007)
, pp. 603-607
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
-
19
-
-
35148895900
-
Agent-based Trust Model in Wireless Sensor Networks
-
July 30, Aug 1, Qingdao,China
-
Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao. Agent-based Trust Model in Wireless Sensor Networks. 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD2007) July 30 - Aug 1, 2007 Qingdao,China.
-
(2007)
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD2007)
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
|