-
1
-
-
51349151780
-
Vulnerability of Network Traffic Under Node Capture Attacks Using Circuit Theoretic Analysis
-
Apr
-
P. Tague, D. Slater, J. Rogers, and R. Poovendran, "Vulnerability of Network Traffic Under Node Capture Attacks Using Circuit Theoretic Analysis," Proc. IEEE INFOCOM '08, pp. 664-672, Apr. 2008.
-
(2008)
Proc. IEEE INFOCOM '08
, pp. 664-672
-
-
Tague, P.1
Slater, D.2
Rogers, J.3
Poovendran, R.4
-
4
-
-
34248339107
-
Modeling Adaptive Node Capture Attacks in Multi-Hop Wireless Networks
-
Aug
-
P. Tague and R. Poovendran, "Modeling Adaptive Node Capture Attacks in Multi-Hop Wireless Networks," Ad Hoc Networks, vol. 5, no. 6, pp. 801-814, Aug. 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.6
, pp. 801-814
-
-
Tague, P.1
Poovendran, R.2
-
5
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," Proc. IEEE Symp. Security and Privacy (SP '03), pp. 197-213, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy (SP '03)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
23244467182
-
A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
-
May
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
7
-
-
16644374371
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
Feb
-
D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
9
-
-
1842815876
-
Security Based on Network Topology against the Wiretapping Attack
-
Feb
-
K. Jain, "Security Based on Network Topology against the Wiretapping Attack," IEEE Wireless Comm., vol. 11, no. 1, pp. 68-71, Feb. 2004.
-
(2004)
IEEE Wireless Comm
, vol.11
, Issue.1
, pp. 68-71
-
-
Jain, K.1
-
12
-
-
11244327295
-
-
Addison-Wesley, ch. 5, pp
-
D.B. Johnson, D.A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Addison-Wesley, ch. 5, pp. 139-172, 2001.
-
(2001)
DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
14
-
-
0003405130
-
-
Dept. Computer Science, Univ. of California, Los Angeles, Technical Report UCLA/CSD-TR-01-0023, May
-
Y. Yu, R. Govindan, and D. Estrin, "Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks," Dept. Computer Science, Univ. of California, Los Angeles, Technical Report UCLA/CSD-TR-01-0023, May 2001.
-
(2001)
Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks
-
-
Yu, Y.1
Govindan, R.2
Estrin, D.3
-
15
-
-
0018545449
-
How to Share a Secret
-
Nov
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0142008000
-
The Benefits of Coding over Routing in a Randomized Setting
-
June/July
-
T. Ho, R. Koetter, M. Medard, D.R. Karger, and M. Effros, "The Benefits of Coding over Routing in a Randomized Setting," Proc. IEEE Int'l Symp. Information Theory (ISIT '03), p. 441, June/July 2003.
-
(2003)
Proc. IEEE Int'l Symp. Information Theory (ISIT '03)
, pp. 441
-
-
Ho, T.1
Koetter, R.2
Medard, M.3
Karger, D.R.4
Effros, M.5
-
18
-
-
84865507939
-
Introducing Traffic Analysis
-
A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, eds, Auerbach, Dec
-
G. Danezis and R. Clayton, "Introducing Traffic Analysis," Digital Privacy: Theory, Technologies, and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. di Vimercati, eds., Auerbach, Dec. 2007.
-
(2007)
Digital Privacy: Theory, Technologies, and Practices
-
-
Danezis, G.1
Clayton, R.2
-
19
-
-
0000951232
-
Worst-Case Analysis of Greedy Heuristics for Integer Programming with Nonnegative Data
-
Nov
-
G. Dobson, "Worst-Case Analysis of Greedy Heuristics for Integer Programming with Nonnegative Data," Math. of Operations Research, vol. 7, no. 4, pp. 515-531, Nov. 1982.
-
(1982)
Math. of Operations Research
, vol.7
, Issue.4
, pp. 515-531
-
-
Dobson, G.1
-
20
-
-
0000301097
-
Greedy Heuristic for the Set-Covering Problem
-
Aug
-
V. Chvatel, "Greedy Heuristic for the Set-Covering Problem," Math, of Operations Research, vol. 4, no. 3, pp. 233-235, Aug. 1979.
-
(1979)
Math, of Operations Research
, vol.4
, Issue.3
, pp. 233-235
-
-
Chvatel, V.1
|