-
2
-
-
29844455855
-
Research and analysis on routing protocols for wireless sensor networks
-
(27-30 May)
-
Dai S, Jing X, Li L (2005) Research and analysis on routing protocols for wireless sensor networks. Proceedings of the International Conference on Communications, Circuits and Systems, volume 1, pp 407-411 (27-30 May)
-
(2005)
Proceedings of the International Conference on Communications, Circuits and Systems
, vol.1
, pp. 407-411
-
-
Dai, S.1
Jing, X.2
Li, L.3
-
4
-
-
33750319005
-
Security in wireless sensor networks: Issues and challenges
-
Phoenix Park, Korea, (20-22 February)
-
Pathan A-SK, Lee H-W, Hong CS (2006) Security in wireless sensor networks: issues and challenges. Proceedings of the 8th IEEE ICACT 2006, Volume II, Phoenix Park, Korea, pp 1043-1048, (20-22 February)
-
(2006)
Proceedings of the 8th IEEE ICACT 2006
, vol.2
, pp. 1043-1048
-
-
Pathan, A-S.K.1
Lee, H-W.2
Hong, C.S.3
-
5
-
-
38148999401
-
A secure energy-efficient routing protocol for WSN
-
LNCS 4742, Springer
-
Pathan A-SK, Hong CS (2007) A secure energy-efficient routing protocol for WSN. ISPA 2007, LNCS 4742, Springer, pp 407-418
-
(2007)
ISPA 2007
, pp. 407-418
-
-
Pathan, A-S.K.1
Hong, C.S.2
-
6
-
-
4143130875
-
Energy efficient security protocol for wireless sensor networks
-
(6-9 Oct)
-
Çam H, Özdemir S, Muthuavinashiappan D, Nair P (2003) Energy efficient security protocol for wireless sensor networks. IEEE 58th Vehicular Technology Conference, 2003, VTC 2003-Fall 2003, volume 5, pp 2981-2984, (6-9 Oct)
-
(2003)
IEEE 58th Vehicular Technology Conference, 2003, VTC 2003-Fall 2003
, vol.5
, pp. 2981-2984
-
-
Çam, H.1
Özdemir, S.2
Muthuavinashiappan, D.3
Nair, P.4
-
7
-
-
32644435647
-
Energy-efficient secure pattern based data aggregation for wireless sensor networks
-
4
-
H Çam S Özdemir P Nair D Muthuavinashiappan HO Sanli 2006 Energy-efficient secure pattern based data aggregation for wireless sensor networks Comput Commun 29 4 446 455
-
(2006)
Comput Commun
, vol.29
, pp. 446-455
-
-
H. Çam1
S. Özdemir2
Nair, P.3
Muthuavinashiappan, D.4
Sanli, H.O.5
-
8
-
-
17144429277
-
Statistical en-route filtering of injected false data in sensor networks
-
4
-
F Ye H Luo S Lu L Zhang 2005 Statistical en-route filtering of injected false data in sensor networks IEEE J Sel Area Commun 23 4 839 850
-
(2005)
IEEE J Sel Area Commun
, vol.23
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
9
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
Zhu S, Setia S, Jajodia S, Ning P (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Proceedings of S&P, pp 259-271
-
(2004)
Proceedings of S&P
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
10
-
-
85089842936
-
Key inheritance-based false data filtering scheme in wireless sensor networks
-
Springer
-
Lee HY, Cho TH (2006) Key inheritance-based false data filtering scheme in wireless sensor networks. Lecture notes in computer science, LNCS 4317, Springer, pp 116-127
-
(2006)
Lecture Notes in Computer Science, LNCS 4317
, pp. 116-127
-
-
Lee, H.Y.1
Cho, T.H.2
-
13
-
-
33646802951
-
An energy delay efficient multi-hop routing scheme for wireless sensor networks
-
5
-
TT Hyunh CS Hong 2006 An energy delay efficient multi-hop routing scheme for wireless sensor networks IEICE Trans Inf Syst E89-D 5 1654 1661
-
(2006)
IEICE Trans Inf Syst
, vol.E89-D
, Issue.5
, pp. 1654-1661
-
-
Hyunh, T.T.1
Hong, C.S.2
-
14
-
-
1642603917
-
Secure routing for large-scale wireless sensor networks
-
(9-11 April)
-
Yin C, Huang S, Su P, Gao C (2003) Secure routing for large-scale wireless sensor networks. In Proceedings of IEEE ICCT 2003, volume 2, pp 1282-1286, (9-11 April)
-
(2003)
Proceedings of IEEE ICCT 2003
, vol.2
, pp. 1282-1286
-
-
Yin, C.1
Huang, S.2
Su, P.3
Gao, C.4
-
16
-
-
84871127221
-
-
Xbow Sensor Networks. Available at:
-
Xbow Sensor Networks. Available at: http://www.xbow.com/
-
-
-
-
17
-
-
0035507503
-
Design methodologies for adaptive and multimedia networks
-
11
-
ZJ Hass 2001 Design methodologies for adaptive and multimedia networks IEEE Commun Mag 39 11 106 107
-
(2001)
IEEE Commun Mag
, vol.39
, pp. 106-107
-
-
Hass, Z.J.1
-
19
-
-
4243642312
-
Constructing digital signatures from one-way function
-
SRI International, October
-
Lamport L (1979) Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International, October
-
(1979)
Technical report SRI-CSL-98
-
-
Lamport, L.1
-
20
-
-
84871113487
-
-
The Network Simulator-ns-2.
-
The Network Simulator-ns-2. http://www.isi.edu/nsnam/ns/
-
-
-
-
23
-
-
33745962983
-
On the computation-storage trade-offs of hash chain traversal
-
Guadeloupe, (January)
-
Sella Y (2003) On the computation-storage trade-offs of hash chain traversal. The 7th International Financial Cryptography Conference, Guadeloupe, (January)
-
(2003)
The 7th International Financial Cryptography Conference
-
-
Sella, Y.1
-
24
-
-
27644514625
-
Congestion control and fairness for many-to-one routing in sensor networks
-
Ee CT, Bajcsy R (2004) Congestion control and fairness for many-to-one routing in sensor networks. Proceedings of ACM SenSys'04, 148-161
-
(2004)
Proceedings of ACM SenSys'04
, pp. 148-161
-
-
Ee, C.T.1
Bajcsy, R.2
|