-
1
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
S. Misra and G. Xue, "Efficient anonymity schemes for clustered wireless sensor networks," International Journal of Sensor Networks, vol. 1, no. 1/2, pp. 50-63, 2006.
-
(2006)
International Journal of Sensor Networks
, vol.1
, Issue.1-2
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
3
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
5
-
-
22944492132
-
Ao2p: Ad hoc on-demand position-based private routing protocol
-
fellow-Bharat Bhargava
-
X. Wu, "Ao2p: Ad hoc on-demand position-based private routing protocol," IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 335-348, 2005, fellow-Bharat Bhargava.
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.4
, pp. 335-348
-
-
Wu, X.1
-
6
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks," in Ninth Internation Conference on Network Protocols (ICNP'01), 2001, pp. 251-260.
-
(2001)
Ninth Internation Conference on Network Protocols (ICNP'01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
7
-
-
4544307667
-
-
A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, and K. Jones, On providing anonymity in wireless sensor networks, in 10th International Conference on Parallel and Distributed Systems (ICPADS 2004), 7-9 July 2004, Newport Beach, CA, USA, 2004, pp. 411-418.
-
A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, and K. Jones, "On providing anonymity in wireless sensor networks," in 10th International Conference on Parallel and Distributed Systems (ICPADS 2004), 7-9 July 2004, Newport Beach, CA, USA, 2004, pp. 411-418.
-
-
-
-
8
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks," Wirel. Netw., vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wirel. Netw
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
9
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY. USA: ACM Press
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security. New York, NY. USA: ACM Press, 2003, pp. 62-72.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
11
-
-
24944483778
-
Securing sensor networks with location-based keys
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing sensor networks with location-based keys," in Wireless Communications and Networking Conference, vol. 4, 2005, pp. 1909-1914.
-
(2005)
Wireless Communications and Networking Conference
, vol.4
, pp. 1909-1914
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
12
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
New York, NY, USA: ACM Press
-
C. Ozturk, Y. Zhang, and W. Trappe, "Source-location privacy in energy-constrained sensor network routing," in SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2004, pp. 88-93.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
13
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
Washington, DC, USA: IEEE Computer Society
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor network routing." in ICDCS '0.5: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'0.5). Washington, DC, USA: IEEE Computer Society, 2005, pp. 599-608.
-
(2005)
ICDCS '0.5: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'0.5)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
14
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
Washington, DC, USA: IEEE Computer Society
-
J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks," in SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). Washington, DC, USA: IEEE Computer Society, 2005, pp. 113-126.
-
(2005)
SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
|