-
1
-
-
3142735222
-
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
-
IEEE CS Press
-
D. Liu, C.-H. Chi, and M. Li, "Normalizing Traffic Pattern with Anonymity for Mission Critical Applications," Proc. 37th Ann. Simulation Symp., IEEE CS Press, 2004, p. 293.
-
(2004)
Proc. 37th Ann. Simulation Symp
, pp. 293
-
-
Liu, D.1
Chi, C.-H.2
Li, M.3
-
2
-
-
10844255649
-
Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act
-
D.K. Mulligan, "Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act," George Washington Law Rev., vol. 72, 2004, p. 1557.
-
(2004)
George Washington Law Rev
, vol.72
, pp. 1557
-
-
Mulligan, D.K.1
-
3
-
-
10844281812
-
A User's Guide to the Stored Communications Act - and a Legislator's Guide to Amending It
-
O.S. Kerr, "A User's Guide to the Stored Communications Act - and a Legislator's Guide to Amending It," George Washington Law Rev., vol. 72, 2004, p. 1208.
-
(2004)
George Washington Law Rev
, vol.72
, pp. 1208
-
-
Kerr, O.S.1
-
4
-
-
33745905102
-
A New Frequency-based Side Channel Attack for Embedded Systems,
-
MS thesis, Dept. of Electrical and Computer Eng, Univ. of Waterloo
-
C.C. Tiu, "A New Frequency-based Side Channel Attack for Embedded Systems," MS thesis, Dept. of Electrical and Computer Eng., Univ. of Waterloo, 2005.
-
(2005)
-
-
Tiu, C.C.1
-
5
-
-
0035424017
-
Location Systems for Ubiquitous Computing
-
J. Hightower and G. Borriella, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, 2001, pp. 57-66.
-
(2001)
Computer
, vol.34
, Issue.8
, pp. 57-66
-
-
Hightower, J.1
Borriella, G.2
-
6
-
-
84862131680
-
Aida: Adaptive Application-independent Data Aggregation in Wireless Sensor Networks
-
T. He et al., "Aida: Adaptive Application-independent Data Aggregation in Wireless Sensor Networks," ACM Trans. Embedded Computing System, vol. 3, no. 2, 2004, pp. 426-457.
-
(2004)
ACM Trans. Embedded Computing System
, vol.3
, Issue.2
, pp. 426-457
-
-
He, T.1
-
7
-
-
33847297141
-
Countermeasures against Traffic Analysis Attacks in Wireless Sensor Networks
-
SECURECOMM, IEEE CS Press
-
J. Deng, R. Han, and S. Mishra, "Countermeasures against Traffic Analysis Attacks in Wireless Sensor Networks," Proc. 1st Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SECURECOMM), IEEE CS Press, 2005, pp. 113-126.
-
(2005)
Proc. 1st Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
0034770039
-
Real-time Health Monitoring of Civil Infrastructure Systems in Colombia, Health Monitoring and Management of Civil Infrastructure Systems
-
P. Thomson et al., "Real-time Health Monitoring of Civil Infrastructure Systems in Colombia," Health Monitoring and Management of Civil Infrastructure Systems, Proc. SPIE, vol. 4337, 2001, pp. 113-121.
-
(2001)
Proc. SPIE
, vol.4337
, pp. 113-121
-
-
Thomson, P.1
-
9
-
-
45849120977
-
Alarm-Net: Wireless Sensor Networks for Assisted-Living and Residential Monitoring,
-
CS-2006-11, Dept. of Computer Science, Univ. of Virginia
-
A. Wood et al., "Alarm-Net: Wireless Sensor Networks for Assisted-Living and Residential Monitoring," tech. report CS-2006-11, Dept. of Computer Science, Univ. of Virginia, 2006.
-
(2006)
tech. report
-
-
Wood, A.1
-
11
-
-
4243114087
-
Habitat Monitoring with Sensor Networks
-
R. Szewczyk et al., "Habitat Monitoring with Sensor Networks," Comm. ACM, vol. 47, no. 6, 2004, pp. 34-40.
-
(2004)
Comm. ACM
, vol.47
, Issue.6
, pp. 34-40
-
-
Szewczyk, R.1
|