-
1
-
-
33845948794
-
Network coding for wireless applications: A brief tutorial
-
London, UK, May
-
Deb, S., Effros, M., Ho, T., Karger, D., Koetter, R., Lun, D., Medard, M., and Ratnakar, N. (2005). Network coding for wireless applications: A brief tutorial. Proc. of IWWAN, London, UK, May.
-
(2005)
Proc. of IWWAN
-
-
Deb, S.1
Effros, M.2
Ho, T.3
Karger, D.4
Koetter, R.5
Lun, D.6
Medard, M.7
Ratnakar, N.8
-
2
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
3
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
New York, NY, USA. ACM Press
-
Eschenauer, L. and Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 41- 47, New York, NY, USA. ACM Press.
-
(2002)
CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
4
-
-
33745142955
-
Network coding: An instant primer
-
Fragouli, C, Boudec, J.-Y. L., and Widmer, J. (2006). Network coding: an instant primer. SIGCOMM Comput. Commun. Rev., 36(l):63-68.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.L
, pp. 63-68
-
-
Fragouli, C.1
Boudec, J.-Y.L.2
Widmer, J.3
-
6
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, California
-
Malan, D., Welsh, M., and Smith, M. (2004). A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara, California.
-
(2004)
First IEEE International Conference on Sensor and Ad Hoc Communications and Network
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
7
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
9
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Christianson, B, Crispo, B, Malcolm, J. A, and Roe, M, editors, Security Protocols Workshop, of, Springer
-
Stajano, F. and Anderson, R. J. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Christianson, B., Crispo, B., Malcolm, J. A., and Roe, M., editors, Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172-194. Springer.
-
(1999)
Lecture Notes in Computer Science
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
10
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
New York, NY, USA. ACM Press
-
Zhu, S., Setia, S., and Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 62-72, New York, NY, USA. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|