-
1
-
-
49149099123
-
-
Department of Computer Science, University of Tennessee, Knoxville
-
Mayank Saraogi, "Security in Wireless Sensor Networks" Department of Computer Science, University of Tennessee, Knoxville.
-
Security in Wireless Sensor Networks
-
-
Saraogi, M.1
-
2
-
-
0034771605
-
SPINS: Security protocols for Sensor Networks
-
In The
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar. "SPINS: Security protocols for Sensor Networks." In The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001), 2001.
-
(2001)
Seventh Annual International Conference on Mobile Computing and Networking (MobiCom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
3
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
Baltimore, MD, November
-
Chris Karlof, Naveen Sastry, David Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
-
(2004)
Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
4
-
-
4243082091
-
Security in Wireless Sensor Networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
5
-
-
0034445661
-
System Architecture directions for Networked Sensors
-
November
-
Hill, Jason, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. "System Architecture directions for Networked Sensors." In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX) (November 2000).
-
(2000)
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS
, vol.9
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
8
-
-
11144340927
-
Designing Secure Sensor Networks
-
December
-
Elaine Shi and Adrian Perrig, "Designing Secure Sensor Networks", IEEE Wireless Communications, pp 38-43 December 2004.
-
(2004)
IEEE Wireless Communications
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
9
-
-
1542376949
-
Analyzing and Modeling Encryption Overhead for Sensor Network Nodes
-
Sep
-
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller and Mihail Sichitiu, "Analyzing and Modeling Encryption Overhead for Sensor Network Nodes" Workshop on Wireless Sensor Networks and Applications (WSNA'03) with MobiCom'03, Sep 2003.
-
(2003)
Workshop on Wireless Sensor Networks and Applications (WSNA'03) with MobiCom'03
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
10
-
-
54249158126
-
-
Martin Boesgaard, Mette Vesterager, Thomas Christensen, Erik Zenner The Stream Cipher Rabbit ECRYPT Stream Cipher Project Report 2005/006.
-
Martin Boesgaard, Mette Vesterager, Thomas Christensen, Erik Zenner "The Stream Cipher Rabbit" ECRYPT Stream Cipher Project Report 2005/006.
-
-
-
-
11
-
-
84937407719
-
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
-
T, Okamoto ed
-
M. Bellare and C. Namprempre, "Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm", Lecture Notes in Computer Science Vol. 1976, T, Okamoto ed, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
-
-
Bellare, M.1
Namprempre, C.2
-
12
-
-
54249118879
-
-
http://www.hitachiappliances.com
-
-
-
|