-
1
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, pp
-
A. Perrig, R. Szewczyk, and V. Wen, et al, "SPINS: Security protocols for sensor networks", Proc. of ACM MOBICOM, Rome, Italy, pp. 189-199, 2001.
-
(2001)
Proc. of ACM MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
-
2
-
-
0038341106
-
-
L. Eschenauer, V. D. Gligor, A key-management scheme for distributed sensor networks, Proc. of ACM Conference on Computer and Communications Security, Washington D.C, USA, pp.41-47, 2002.
-
L. Eschenauer, V. D. Gligor, "A key-management scheme for distributed sensor networks", Proc. of ACM Conference on Computer and Communications Security, Washington D.C, USA, pp.41-47, 2002.
-
-
-
-
3
-
-
0038487088
-
Random key pre-distribution schemes for sensor networks
-
Berkeley, California, USA, pp
-
H. Chan, A. Perrig, and D. Song, "Random key pre-distribution schemes for sensor networks", Proc. of IEEE S&P, Berkeley, California, USA, pp.197-213, 2003.
-
(2003)
Proc. of IEEE S&P
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
17144429277
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, and S. Lu, "Statistical en-route detection and filtering of injected false data in sensor networks", IEEE Journal on Selected Areas in Communications, Vol.23, No.4, pp.839-850, 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.4
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
-
5
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
-
Oakland, California, USA, pp
-
S. Zhu, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks", Proc. of IEEE S&P, Oakland, California, USA, pp.259-271, 2004.
-
(2004)
Proc. of IEEE S&P
, pp. 259-271
-
-
Zhu, S.1
Jajodia, S.2
Ning, P.3
-
6
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A pre-distribution and local collaboration-based approach
-
Miami, Florida, USA, pp
-
W. Zhang, G. Cao, "Group rekeying for filtering false data in sensor networks: a pre-distribution and local collaboration-based approach", Proc. of IEEE INFOCOM, Miami, Florida, USA, pp.503-514, 2005.
-
(2005)
Proc. of IEEE INFOCOM
, pp. 503-514
-
-
Zhang, W.1
Cao, G.2
-
7
-
-
17144414947
-
Commutative cipher based en-route filtering in wireless sensor networks
-
Los Angeles, California, USA, pp
-
H. Yang, S. Lu, "Commutative cipher based en-route filtering in wireless sensor networks" Proc. of IEEE VTC Wireless Security Symposium, Los Angeles, California, USA, pp.1223-1227, 2004.
-
(2004)
Proc. of IEEE VTC Wireless Security Symposium
, pp. 1223-1227
-
-
Yang, H.1
Lu, S.2
-
8
-
-
38549177436
-
A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks
-
Barcelora, Spain, April
-
Zhen Yu and Yong Guan, "A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks" Proc. of INFOCOM, Barcelora, Spain, April, 2006.
-
(2006)
Proc. of INFOCOM
-
-
Yu, Z.1
Guan, Y.2
-
9
-
-
33751173838
-
Resilience of sink filtering scheme in wireless sensor networks
-
Elsevier
-
Miao Ma. "Resilience of sink filtering scheme in wireless sensor networks," Computer Communications, Elsevier, Volume 30, pp.55-65, 2006
-
(2006)
Computer Communications
, vol.30
, pp. 55-65
-
-
Miao, M.1
-
11
-
-
8344268530
-
Optimizing tree reconfiguration for mobile target tracking in sensor networks
-
Hong Kong, P. R. China, pp
-
W. Zhang, G. Cao, "Optimizing tree reconfiguration for mobile target tracking in sensor networks", Proc. of IEEE Conference on Computer Communications, Hong Kong, P. R. China, pp.2434-2445, 2004.
-
(2004)
Proc. of IEEE Conference on Computer Communications
, pp. 2434-2445
-
-
Zhang, W.1
Cao, G.2
-
12
-
-
7544235797
-
DCTC: Dynamic convoy tree-based collaboration for target tracking in sensor networks
-
W. Zhang, G. Cao, "DCTC: Dynamic convoy tree-based collaboration for target tracking in sensor networks", IEEE Transactions on Wireless Communication, Vol.3, No.5, pp. 1689-1701, 2004.
-
(2004)
IEEE Transactions on Wireless Communication
, vol.3
, Issue.5
, pp. 1689-1701
-
-
Zhang, W.1
Cao, G.2
-
13
-
-
2442529460
-
GRAdient broadcast: A robust data delivery protocol for large scale senor networks
-
F. Ye, G. Zhong, and S. Lu, "GRAdient broadcast: A robust data delivery protocol for large scale senor networks", ACM Wireless Networks, Vol.11, No.3, pp.285-298, 2005.
-
(2005)
ACM Wireless Networks
, vol.11
, Issue.3
, pp. 285-298
-
-
Ye, F.1
Zhong, G.2
Lu, S.3
-
14
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication", Lecture Notes in Computer Science, Vol.1109, pp.1-15, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
15
-
-
84907549442
-
Energy aware routing for low energy ad hoc sensor networks
-
Orlando, Florida, USA, pp
-
R.C. Shah, J. M. Rabacey, "Energy aware routing for low energy ad hoc sensor networks", Proc. of IEEE WCNC, Orlando, Florida, USA, pp.350-355, 2002.
-
(2002)
Proc. of IEEE WCNC
, pp. 350-355
-
-
Shah, R.C.1
Rabacey, J.M.2
-
16
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
Boston, Massachussetts, USA, pp
-
C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks", Proc. of ACM MOBICOM, Boston, Massachussetts, USA, pp.56-67, 2000.
-
(2000)
Proc. of ACM MOBICOM
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
17
-
-
0141804902
-
The OMNeT++ discrete event simulation system
-
Prague, Czech Republic, pp
-
A. Varga, "The OMNeT++ discrete event simulation system", Proc. of European Simulation Multiconference, Prague, Czech Republic, pp.319-324, 2001.
-
(2001)
Proc. of European Simulation Multiconference
, pp. 319-324
-
-
Varga, A.1
-
18
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom. "Space/time trade-offs in hash coding with allowable errors", Communications of the ACM, Vol. 13, No.7, pp.422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
|