-
1
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
3
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
V. Cahill, E. Gray, J.-M. Seigneur, C. D. Jensen, Y. Chen, B. Shand, N. Dimmock, A. Twigg, J. Bacon, C. English, W. Wagealla, S. Terzis, P. Nixon, G. di Marzo Serugendo, C. Bryce, M. Carbone, K. Krakow, and M. Nielsen, "Using trust for secure collaboration in uncertain environments," Pervasive Computing, vol. 2, pp. 52-61, 2003.
-
(2003)
Pervasive Computing
, vol.2
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
Seigneur, J.-M.3
Jensen, C.D.4
Chen, Y.5
Shand, B.6
Dimmock, N.7
Twigg, A.8
Bacon, J.9
English, C.10
Wagealla, W.11
Terzis, S.12
Nixon, P.13
di Marzo Serugendo, G.14
Bryce, C.15
Carbone, M.16
Krakow, K.17
Nielsen, M.18
-
4
-
-
0006497460
-
Caching trust rather than content
-
Online, Available
-
M. Sathyanarayanan, "Caching trust rather than content," Operating Systems Review, vol. 34, no. 4, pp. 32-33, 2000. [Online]. Available: citeseer.ist.psu.edu/satyanarayanan00caching.html
-
(2000)
Operating Systems Review
, vol.34
, Issue.4
, pp. 32-33
-
-
Sathyanarayanan, M.1
-
5
-
-
4544301639
-
Trust propagation in small worlds
-
Online, Available
-
E. Gray, J. Seigneur, Y. Chen, and C. Jensen, "Trust propagation in small worlds," in Proceedings of the First International Conference on Trust Management (iTrust2003), 2003. [Online]. Available: citeseer.ist. psu.edu/gray03trast.html
-
(2003)
Proceedings of the First International Conference on Trust Management (iTrust2003)
-
-
Gray, E.1
Seigneur, J.2
Chen, Y.3
Jensen, C.4
-
8
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
February
-
G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 318-328, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
9
-
-
36949013183
-
Drbts: Distributed reputationbased beacon trust system
-
A. Srinivasan, J. Teitelbaum, and J. Wu, "Drbts: Distributed reputationbased beacon trust system." in DASC, 2006, pp. 277-283.
-
(2006)
DASC
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
10
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Y. L. Sun, W. Yu, Z. Han, and K. Lui, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 305-317, 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Lui, K.4
-
11
-
-
27544433189
-
-
M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, and Y. C. Hu, Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks, dsn, 00, pp. 672-681, 2005.
-
M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, and Y. C. Hu, "Tibfit: Trust index based fault tolerance for arbitrary data faults in sensor networks," dsn, vol. 00, pp. 672-681, 2005.
-
-
-
-
12
-
-
32144459886
-
Tinysec: A link layer security architecture for wireless sensor networks
-
November
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A link layer security architecture for wireless sensor networks," in Proceedings of Sensys 2004, November 2004.
-
(2004)
Proceedings of Sensys 2004
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
14
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
May
-
J. McCune, E. Shi, A. Perrig, and M. Reiter, "Detection of denial-of-message attacks on sensor network broadcasts," in IEEE Computer Society Symposium on Security and Privacy, May 2005.
-
(2005)
IEEE Computer Society Symposium on Security and Privacy
-
-
McCune, J.1
Shi, E.2
Perrig, A.3
Reiter, M.4
-
15
-
-
48049095097
-
Realizing robust user authentication in sensor networks
-
N. G. Zinaida Benenson and O. Raivio, "Realizing robust user authentication in sensor networks," in RealWSN, 2005.
-
(2005)
RealWSN
-
-
Zinaida Benenson, N.G.1
Raivio, O.2
-
16
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet (best paper)
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz, "Sizzle: A standards-based end-to-end security architecture for the embedded internet (best paper)," in PerCom, 2005, pp. 247-256.
-
(2005)
PerCom
, pp. 247-256
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
18
-
-
48049124861
-
A visual basic program giving weighted confidence intervals for mean and variance,
-
1581, June
-
D. Krause and C. Withers, "A visual basic program giving weighted confidence intervals for mean and variance," Industrial Research Limited Report 1581, June 2004.
-
(2004)
Industrial Research Limited Report
-
-
Krause, D.1
Withers, C.2
-
19
-
-
48049106564
-
-
J. M. Bland and S. Kerry, Weighted comparison of means, BMJ, 1998.
-
J. M. Bland and S. Kerry, "Weighted comparison of means," BMJ, 1998.
-
-
-
-
20
-
-
84866469313
-
Serloc: Robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran, "Serloc: Robust localization for wireless sensor networks," ACM Trans. Sen. Netw., vol. 1, no. 1, pp. 73-100, 2005.
-
(2005)
ACM Trans. Sen. Netw
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
-
21
-
-
84962853206
-
Low energy adaptive clustering hierarchy with deterministic cluster-head selection
-
Stockholm, Online, Available
-
M. Handy, M. Haase, and D. Timmermann, "Low energy adaptive clustering hierarchy with deterministic cluster-head selection," Proceedings of IEEE International Conference on Mobile and Wireless Communications Networks, Stockholm, 2002., 2002. [Online]. Available: citeseer.ist.psu.edu/handy021ow.html
-
(2002)
Proceedings of IEEE International Conference on Mobile and Wireless Communications Networks
-
-
Handy, M.1
Haase, M.2
Timmermann, D.3
|