-
2
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
ACM Press
-
Jonathan W. Hui and David Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In SenSys '04, pages 81-94. ACM Press, 2004.
-
(2004)
SenSys '04
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
4
-
-
27644540636
-
Mnp: Multihop network reprogramming service for sensor networks
-
ACM Press
-
Limin Wang. Mnp: multihop network reprogramming service for sensor networks. In SenSys '04, pages 285-286. ACM Press, 2004.
-
(2004)
SenSys '04
, pp. 285-286
-
-
Wang, L.1
-
5
-
-
20344373400
-
Incremental network programming for wireless sensors
-
Jaein Jeong and D. Culler. Incremental network programming for wireless sensors. In IEEE SECON 2004, Pages 25-33, 2004.
-
(2004)
IEEE SECON 2004
, pp. 25-33
-
-
Jeong, J.1
Culler, D.2
-
7
-
-
0043126255
-
A method FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
-
Technical Report MIT/LCS/TM-82, 1977
-
R. L. Rivest, A. Shamir, and L. M. Adelman. A method FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS. Technical Report MIT/LCS/TM-82, 1977.
-
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.M.3
-
10
-
-
34247376029
-
Securing the deluge network programming system
-
ACM Press
-
Prabal K. Dutta, Jonathan W. Hui, David C. Chu, and David E. Culler. Securing the deluge network programming system. In IPSN '06, pages 326 - 333. ACM Press, 2006.
-
(2006)
IPSN '06
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
12
-
-
33947642085
-
Sluice: Secure dissemination of code updates in sensor networks
-
P. E. Lanigan, R. Gandhi, and P. Narasimhan. Sluice: Secure dissemination of code updates in sensor networks. In ICDCS 2006, pages 53-63, 2006.
-
(2006)
ICDCS 2006
, pp. 53-63
-
-
Lanigan, P.E.1
Gandhi, R.2
Narasimhan, P.3
-
13
-
-
34247397108
-
Secure code distribution in dynamically programmable wireless sensor networks
-
ACM Press
-
Jing Deng, Richard Han, and Shivakant Mishra. Secure code distribution in dynamically programmable wireless sensor networks. In IPSN '06, pages 292 - 300. ACM Press, 2006.
-
(2006)
IPSN '06
, pp. 292-300
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
14
-
-
44349158878
-
Confidential and secure broadcast in wireless sensor networks
-
Jaleel Shaheen, Diethelm Ostry, Vijay Sivaraman, and Sanjay Jha. Confidential and secure broadcast in wireless sensor networks. In PIMRC 2007, 2007.
-
(2007)
PIMRC 2007
-
-
Shaheen, J.1
Ostry, D.2
Sivaraman, V.3
Jha, S.4
-
15
-
-
56749118494
-
Tradeoffs in configuring secure data dissemination in sensor networks: An empirical outlook
-
Technical Report 006, Carnegie Mellon University, May
-
Patrick E. Lanigan, Priya Narasimhan, and Rajeev Gandhi. Tradeoffs in configuring secure data dissemination in sensor networks: An empirical outlook. Technical Report 006, Carnegie Mellon University, May 2007.
-
(2007)
-
-
Lanigan, P.E.1
Narasimhan, P.2
Gandhi, R.3
-
16
-
-
0034771605
-
Spins: Security-protocols for sensor netowrks
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, and J. D. Tygar. Spins: security-protocols for sensor netowrks. In Mobile Computing and Networking, pages 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
17
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM Press
-
Laurent Eschenauer and Virgil D. Gligor. A key-management scheme for distributed sensor networks. In CCS '02, pages 41-47. ACM Press, 2002.
-
(2002)
CCS '02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
19
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
ACM Press
-
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS '03, pages 62 - 72. ACM Press, 2003.
-
(2003)
CCS '03
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
21
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
ACM Press
-
Victor Shnayder, Mark Hempstead, Bor-Rong Chen, Geoff W. Allen, and Matt Welsh. Simulating the power consumption of large-scale sensor network applications. In SenSys '04, pages 188-200. ACM Press, 2004.
-
(2004)
SenSys '04
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.-R.3
Allen, G.W.4
Welsh, M.5
-
22
-
-
34547466172
-
Seven cardinal properties of sensor network broadcast authentication
-
ACM Press
-
Mark Luk, Adrian Perrig, and Bram Whillock. Seven cardinal properties of sensor network broadcast authentication. In SASN '06, pages 147-156. ACM Press, 2006.
-
(2006)
SASN '06
, pp. 147-156
-
-
Luk, M.1
Perrig, A.2
Whillock, B.3
-
23
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
Leslie Lamport. Password authentication with insecure communication. Commun. ACM, 24(11):770-772, November 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
24
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
ACM Press
-
Cynthia Kuo, Mark Luk, Rohit Negi, and Adrian Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In SenSys '07. ACM Press, 2007.
-
(2007)
SenSys '07
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
25
-
-
77953853641
-
Shake them up!: A movement-based pairing protocol for cpu-constrained devices
-
New York, NY, USA, ACM Press
-
Claude Castelluccia and Pars Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In MobiSys '05, pages 51 - 64, New York, NY, USA, 2005. ACM Press.'
-
(2005)
MobiSys '05
, pp. 51-64
-
-
Castelluccia, C.1
Mutaf, P.2
-
27
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ACM Press
-
Chris Karlof, Naveen Sastry, and David Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys '04, pages 162-175. ACM Press, 2004.
-
(2004)
SenSys '04
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
28
-
-
33747445938
-
Deploying long-lived and cost-effective hybrid sensor networks
-
November
-
Wen Hu, Chun T. Chou, Sanjay Jha, and Nirupama Bulusu. Deploying long-lived and cost-effective hybrid sensor networks. Ad Hoc Networks, 4(6):749-767, November 2006.
-
(2006)
Ad Hoc Networks
, vol.4
, Issue.6
, pp. 749-767
-
-
Hu, W.1
Chou, C.T.2
Jha, S.3
Bulusu, N.4
-
30
-
-
56749128593
-
-
Telosb - telosb mote platform. Technical Report 0094.
-
Telosb - telosb mote platform. Technical Report 0094.
-
-
-
-
31
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
Ari Juels and John Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In NDSS '99, Networks and Distributed Security Systems, pages 151-165. 1999.
-
(1999)
NDSS '99, Networks and Distributed Security Systems
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
33
-
-
18844399081
-
Tossim: Accurate and scalable simulation of entire tinyos applications
-
ACM Press
-
Philip Levis, Nelson Lee, Matt Welsh, and David Culler. Tossim: accurate and scalable simulation of entire tinyos applications. In SenSys '03, pages 126-137. ACM Press, 2003.
-
(2003)
SenSys '03
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
|