-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz et al., "Wireless sensor networks: A survey," Comput. Netw., vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Comput. Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
-
2
-
-
55549133691
-
-
K. Paul, Security as a new dimension in embedded system design, 2004.
-
K. Paul, "Security as a new dimension in embedded system design, 2004.
-
-
-
-
3
-
-
84955086579
-
Wireless sensor networks
-
C. Douligeris and C. Douligeris, Eds. New York: Wiley
-
A. G. Voyiatzis and D. N. Serpanos, "Wireless sensor networks," in Network Security, C. Douligeris and C. Douligeris, Eds. New York: Wiley, 2007, pp. 375-390.
-
(2007)
Network Security
, pp. 375-390
-
-
Voyiatzis, A.G.1
Serpanos, D.N.2
-
4
-
-
3242756924
-
Embedded system security
-
Jul
-
P. Koopman, "Embedded system security," Computer, vol. 37, no. 7, pp. 95-97, Jul. 2004.
-
(2004)
Computer
, vol.37
, Issue.7
, pp. 95-97
-
-
Koopman, P.1
-
5
-
-
85014332650
-
Security in embedded systems: Design challenges
-
R. Srivaths et al., "Security in embedded systems: Design challenges," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 461-491, 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst
, vol.3
, Issue.3
, pp. 461-491
-
-
Srivaths, R.1
-
6
-
-
2342652200
-
Tamper resistance mechanisms for secure embedded systems,
-
Mumbai, India
-
S. Ravi, A. Raghunathan, and S. Chakradhar, "Tamper resistance mechanisms for secure embedded systems, " in Proc. 17th Int. Conf. VLSI Design 2004, Mumbai, India, 2004, pp. 605-611.
-
(2004)
Proc. 17th Int. Conf. VLSI Design 2004
, pp. 605-611
-
-
Ravi, S.1
Raghunathan, A.2
Chakradhar, S.3
-
7
-
-
33845412854
-
Security for sensor networks
-
Baltimore, MD
-
J. Undercoffer et al, "Security for sensor networks," in Proc. CADIP Res. Symp., Baltimore, MD, 2002.
-
(2002)
Proc. CADIP Res. Symp
-
-
Undercoffer, J.1
-
8
-
-
0030107358
-
Network security under siege: The timing attack
-
E. English and S. Hamilton, "Network security under siege: The timing attack," Computer, vol. 29, no. 3, pp. 95-97, 1996.
-
(1996)
Computer
, vol.29
, Issue.3
, pp. 95-97
-
-
English, E.1
Hamilton, S.2
-
9
-
-
33845800487
-
Architecture study for smart cameras
-
Munich, Germany
-
H. Broers et al., "Architecture study for smart cameras," in Proc. BOS Conf. Ind. Imag. Mach. Vision, Munich, Germany, 2005, pp. 39-49.
-
(2005)
Proc. BOS Conf. Ind. Imag. Mach. Vision
, pp. 39-49
-
-
Broers, H.1
-
10
-
-
1542286911
-
Efficient code distribution in wireless sensor networks
-
San Diego, CA
-
N. Reijers and K. Langendoen, "Efficient code distribution in wireless sensor networks," in Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat., San Diego, CA, 2003, pp. 60-67.
-
(2003)
Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat
, pp. 60-67
-
-
Reijers, N.1
Langendoen, K.2
-
11
-
-
0032204757
-
Mobile code security
-
Dec
-
A. D. Rubin and D. E. Geer, Jr, "Mobile code security," IEEE Internet Comput., vol. 2, no. 6, pp. 30-34, Dec. 1998.
-
(1998)
IEEE Internet Comput
, vol.2
, Issue.6
, pp. 30-34
-
-
Rubin, A.D.1
Geer Jr, D.E.2
-
12
-
-
0036715137
-
Smart cameras as embedded systems
-
W. Wolf, B. Ozer, and T. Lv, "Smart cameras as embedded systems," Computer, vol. 35, no. 9, pp. 48-53, 2002.
-
(2002)
Computer
, vol.35
, Issue.9
, pp. 48-53
-
-
Wolf, W.1
Ozer, B.2
Lv, T.3
-
13
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, pp. 103-105, 2003.
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
14
-
-
50149108413
-
Smart surveillance: Applications, technologies and implications,
-
Dec. 15-18
-
A. Harnpapur et al., "Smart surveillance: Applications, technologies and implications, " in Proc. 2003 Joint Conf. 4th Int. Conf. Inf., Commun, and Signal Process. 2003 and 4th Pacific Rim Conf. Multimedia, vol. 2, pp. 1133-1138, Dec. 15-18, 2003.
-
(2003)
Proc. 2003 Joint Conf. 4th Int. Conf. Inf., Commun, and Signal Process. 2003 and 4th Pacific Rim Conf. Multimedia
, vol.2
, pp. 1133-1138
-
-
Harnpapur, A.1
-
15
-
-
34948815579
-
PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP
-
Minneapolis, MN, Jun
-
A. Chattopadhyay and T. E. Boult, "PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP," in Proc. IEEE Conf. Computer Vision Pattern Recognition (CVPR'07), Minneapolis, MN, Jun. 2007, pp. 1-8.
-
(2007)
Proc. IEEE Conf. Computer Vision Pattern Recognition (CVPR'07)
, pp. 1-8
-
-
Chattopadhyay, A.1
Boult, T.E.2
-
16
-
-
0034316289
-
Digital rights management and watermarking of multimedia content for m-commerce applications
-
Nov
-
F. Hartung and F. Ramme, "Digital rights management and watermarking of multimedia content for m-commerce applications," IEEE Commun. Mag., vol. 38, no. 11, pp. 78-84, Nov. 2000.
-
(2000)
IEEE Commun. Mag
, vol.38
, Issue.11
, pp. 78-84
-
-
Hartung, F.1
Ramme, F.2
-
17
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
2nd quarter
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surv., vol. 8. 2nd quarter, 2006.
-
(2006)
IEEE Commun. Surv
, vol.8
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
18
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
19
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Washington, DC, Oct. 25
-
R. Watro et al., "TinyPK: Securing sensor networks with public key technology," in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., Washington, DC, Oct. 25, 2004, pp. 59-64.
-
(2004)
Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw
, pp. 59-64
-
-
Watro, R.1
-
20
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, May 11-14
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. 2003 Symp. Security Privacy, Oakland, CA, May 11-14, 2003, pp. 197-213.
-
(2003)
Proc. 2003 Symp. Security Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
21
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, Nov. 17-21
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proc. ACM Conf. Comput. Commun. Security (CCS), Washington, DC, Nov. 17-21, 2002.
-
(2002)
Proc. ACM Conf. Comput. Commun. Security (CCS)
-
-
Eschenauer, L.1
Gligor, V.D.2
-
22
-
-
16644374371
-
-
D. Liu, P. Ning, and R. Li, Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Security (TISSEC), 8, no. 1, pp. 41-77, 2005.
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Trans. Inf. Syst. Security (TISSEC), vol. 8, no. 1, pp. 41-77, 2005.
-
-
-
-
24
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
Urbana-Chanipaign, IL, May
-
H. Yang et al., "Toward resilient security in wireless sensor networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., Urbana-Chanipaign, IL, May 2005, pp. 34-45.
-
(2005)
Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput
, pp. 34-45
-
-
Yang, H.1
-
25
-
-
4544340566
-
Security support for in-network processing in wireless sensor networks
-
Fairfax, VA
-
J. Deng, R. Han, and S. Mishra, "Security support for in-network processing in wireless sensor networks," in Proc. 1st ACM Workshop Security Ad Hoc Sensor Netw., Fairfax, VA, 2003, pp. 83-93.
-
(2003)
Proc. 1st ACM Workshop Security Ad Hoc Sensor Netw
, pp. 83-93
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
26
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington, DC, Oct. 27-30
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in Proc. 10th ACM Conf. Comput. Commun. Security, Washington, DC, Oct. 27-30,2003, pp. 62-72.
-
(2003)
Proc. 10th ACM Conf. Comput. Commun. Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
27
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
San Diego, CA, Sep. 19
-
P. Ganesan et al., "Analyzing and modeling encryption overhead for sensor network nodes," in Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat., San Diego, CA, Sep. 19, 2003, pp.151-159.
-
(2003)
Proc. 2nd ACM Int. Conf. Wireless Sensor Netw. Applicat
, pp. 151-159
-
-
Ganesan, P.1
-
28
-
-
85016596484
-
LiSP: A lightweight security protocol for wireless sensor networks
-
T. Park and K. G. Shin, "LiSP: A lightweight security protocol for wireless sensor networks," ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, pp. 634-660, 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
29
-
-
18844368499
-
Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis
-
San Jose, CA, Oct. 30-Nov. 1
-
R. Venugopalan et al., "Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis," in Proc. Int. Conf. Compilers, Architect. Synth. Embed. Syst., San Jose, CA, Oct. 30-Nov. 1, 2003, pp. 188-197.
-
(2003)
Proc. Int. Conf. Compilers, Architect. Synth. Embed. Syst
, pp. 188-197
-
-
Venugopalan, R.1
-
30
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Maryland, Baltimore, Nov
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Proc. 2nd Int. Conf. Embed. Netw. Sensor Syst., Maryland, Baltimore, Nov. 2005, pp. 162-175.
-
(2005)
Proc. 2nd Int. Conf. Embed. Netw. Sensor Syst
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
31
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig et al., "SPINS: Security protocols for sensor networks," Wireless Netw., vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Netw
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
-
32
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
33
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2-3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Netw
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
34
-
-
27944496237
-
An embedded smart camera on a scalable heterogeneous multi-DSP system
-
Birmingham, U.K, Nov
-
M. Bramberger, B. Rinner, and H. Schwabach, "An embedded smart camera on a scalable heterogeneous multi-DSP system," in Proc. Europ. DSP Educ. Res. Symp. (EDERS 2004), Birmingham, U.K., Nov. 2004.
-
(2004)
Proc. Europ. DSP Educ. Res. Symp. (EDERS 2004)
-
-
Bramberger, M.1
Rinner, B.2
Schwabach, H.3
|