-
1
-
-
4243082091
-
Security in Wireless Sensor Networks
-
Perrig, A.; Stankovic, J.; Wagner, D. Security in Wireless Sensor Networks. Commun. ACM 2004, 47, 53-57.
-
(2004)
Commun. ACM
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
2
-
-
33749631220
-
Energy conserving architectures and algorithms for wireless sensor networks
-
Comeau,F.; Sivakumar, S.C.; Robertson, W.; Phillips, W.J. Energy conserving architectures and algorithms for wireless sensor networks. In 39th Annual Hawaii International Conference on System Sciences (HICSS) 2006, 9, 236c.
-
(2006)
39th Annual Hawaii International Conference on System Sciences (HICSS)
, vol.9
-
-
Comeau, F.1
Sivakumar, S.C.2
Robertson, W.3
Phillips, W.J.4
-
3
-
-
0033357103
-
Securing ad hoc networks
-
Zhou, L; Haas, Z.J. Securing ad hoc networks. IEEE Netw. 1999, 13, 24-30.
-
(1999)
IEEE Netw
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
10044284351
-
-
Zhu, S.; Setia, S.; Jajodia, S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In 10th ACM Conference on Computer and Communications Security (CCS '03); ACM Press 2003, 62-72.
-
Zhu, S.; Setia, S.; Jajodia, S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In 10th ACM Conference on Computer and Communications Security (CCS '03); ACM Press 2003, 62-72.
-
-
-
-
5
-
-
0035789267
-
Secure pebblenets
-
ACM Press
-
Basagni, S.; Herrin, K.; Bruschi, D.; Rosti, E. Secure pebblenets. In Proc. 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing; ACM Press 2001, 156-163.
-
(2001)
Proc. 2001 ACM Int. Symp. on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
6
-
-
0034771605
-
Security Protocols for Sensor Networks
-
ACM Press
-
Perrig, A.; Szewczyk, R.; Wen, V.; Culler, D.; Tygar, J.D. SPINS: Security Protocols for Sensor Networks. In Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking; ACM Press 2001, 189-199.
-
(2001)
Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar5
SPINS, J.D.6
-
9
-
-
4544301464
-
Random key assignments for secure wireless sensor networks
-
ACM Press
-
Pietro, R.D.; Mancini, L.V.; Mei, A. Random key assignments for secure wireless sensor networks. In 1st ACM Workshop on Security of Ad-hoc and Sensor Networks; ACM Press 2003, 10, 62-71.
-
(2003)
1st ACM Workshop on Security of Ad-hoc and Sensor Networks
, vol.10
, pp. 62-71
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
11
-
-
84888289118
-
-
http://www.omnetpp.org/filemgmt/viewcat.php?cid=2
-
-
-
-
12
-
-
51249100419
-
An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks
-
Beijing, China, May 19-23
-
Zhang, C.; Lin, X.; Lu, R. RAISE: An Efficient RSU-aided Message Authentication Scheme in Vehicular Communication Networks. In IEEE International Conference on Communications (ICC'08), Beijing, China, May 19-23, 2008, 5.
-
(2008)
IEEE International Conference on Communications (ICC'08)
, pp. 5
-
-
Zhang, C.1
Lin, X.2
Lu3
RAISE, R.4
-
13
-
-
33750029023
-
On the Security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Security and cryptography for networks
-
Maiori, Italy, September 6-8, Springer-Verlag: Berlin
-
Kim, J.; Biryukov, A.; Preneel, B; Hong, S. On the Security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Security and cryptography for networks. In 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006; Springer-Verlag: Berlin, 2006, 4116, 242-256.
-
(2006)
5th International Conference, SCN 2006
, vol.4116
, pp. 242-256
-
-
Kim, J.1
Biryukov, A.2
Preneel, B.3
Hong, S.4
-
14
-
-
84876663509
-
-
FIPS 180-1. Secure Hash Standard, NIST, U.S. Department of Commerce Washington, D.C., 1995, 4.
-
FIPS 180-1. Secure Hash Standard, NIST, U.S. Department of Commerce Washington, D.C., 1995, 4.
-
-
-
-
15
-
-
79953067606
-
Secure Hash standard (SHS)
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology. Secure Hash standard (SHS). Federal Information Processing Standards Publication 180-2, 2002, 8.
-
(2002)
Federal Information Processing Standards Publication
, vol.180 -2
, pp. 8
-
-
-
16
-
-
0002431508
-
The ALOHA system another alternative for computer communications
-
Abramson, N. The ALOHA system another alternative for computer communications. In AFIPS Conference Proceedings 1970, 37, 695-702
-
(1970)
AFIPS Conference Proceedings
, vol.37
, pp. 695-702
-
-
Abramson, N.1
-
17
-
-
27644451730
-
The Mote Revolution: Low Power Wireless Sensor Network Devices
-
Polaster, J.; Szewczyk, R.; Sharp, C.; Culler, D. The Mote Revolution: Low Power Wireless Sensor Network Devices. In Hot Chips, University of California, Berkeley, August-22-24, 2004.
-
(2004)
Hot Chips, University of California, Berkeley, August-22-24
-
-
Polaster, J.1
Szewczyk, R.2
Sharp, C.3
Culler, D.4
|