-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz, I. F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002, A survey on sensor networks. IEEE Commun. Maga., 40:102-114.
-
(2002)
IEEE Commun. Maga
, vol.40
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
25844486083
-
Spoofing prevention method. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Mar. 13-17
-
London, pp
-
Bremler-Barr, A. and H. Levy, 2005. Spoofing prevention method. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Mar. 13-17, IEEE Xplore, London, pp:536-547.
-
(2005)
IEEE Xplore
, pp. 536-547
-
-
Bremler-Barr, A.1
Levy, H.2
-
5
-
-
1542317077
-
Information assurance in sensor networks
-
San Diego, CA, USA, pp
-
Deb, B., S. Bhatnagar and B. Nath, 2003. Information assurance in sensor networks. Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, 2003, San Diego, CA, USA., pp:160-168.
-
(2003)
Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications
, pp. 160-168
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
6
-
-
0242665588
-
Real-time watermarking techniques for sensor networks
-
Feng, J. and M. Potkonjak, 2003. Real-time watermarking techniques for sensor networks. Proc. SPIE., 5020:391-402.
-
(2003)
Proc. SPIE
, vol.5020
, pp. 391-402
-
-
Feng, J.1
Potkonjak, M.2
-
7
-
-
36949032297
-
Structured streams: A new transport abstraction
-
Ford, B., 2007. Structured streams: A new transport abstraction. SIGCOMM, 37:361-372.
-
(2007)
SIGCOMM
, vol.37
, pp. 361-372
-
-
Ford, B.1
-
8
-
-
33749679756
-
Chaining watermarks for detecting malicious modifications to streaming data
-
Guo, H. P., Y. J. Li and S. Jajodia, 2007. Chaining watermarks for detecting malicious modifications to streaming data. Inform. Sci., 177:281-298.
-
(2007)
Inform. Sci
, vol.177
, pp. 281-298
-
-
Guo, H.P.1
Li, Y.J.2
Jajodia, S.3
-
9
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Nov. 03-05, Baltimore, MD, USA, pp
-
Karlof, C., N. Sastry and D. Wagner, 2004. TinySec: A link layer security architecture for wireless sensor networks. Proceedings of the 2nd international conference on Embedded networked sensor systems, Nov. 03-05, Baltimore, MD, USA., pp:162-175.
-
(2004)
Proceedings of the 2nd international conference on Embedded networked sensor systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
10
-
-
4544248818
-
Radio frequency watermarking for OFDM wireless networks. Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), May 17-21
-
London, pp
-
Kleider, J. E., S. Gifford, S. Chuprun and B. Fette, 2004. Radio frequency watermarking for OFDM wireless networks. Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), May 17-21, IEEE Xplore, London, pp:397-400.
-
(2004)
IEEE Xplore
, pp. 397-400
-
-
Kleider, J.E.1
Gifford, S.2
Chuprun, S.3
Fette, B.4
-
11
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. Proceedings of the 7th International Conference on Information Processing in Sensor Networks, Apr. 22-24
-
London, pp
-
Liu, A. and P. Ning, 2008. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. Proceedings of the 7th International Conference on Information Processing in Sensor Networks, Apr. 22-24, IEEE Xplore, London, pp:245-256.
-
(2008)
IEEE Xplore
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
12
-
-
69549113748
-
MiniSec: A secure sensor network communication architecture
-
Apr. 25-27, Cambridge, Massachusetts, USA, pp
-
Luk, M., G. Mezzour, A. Perrig and V. Gligor, 2007. MiniSec: A secure sensor network communication architecture. Proceedings of the 6th International Conference on Information Processing in Sensor Networks, Apr. 25-27, Cambridge, Massachusetts, USA., pp:5479-488.
-
(2007)
Proceedings of the 6th International Conference on Information Processing in Sensor Networks
, pp. 5479-5488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
13
-
-
67651054619
-
Proving video stream watermarking viability
-
10.1117/2.1200806
-
Mitrea, M., S. Duta and F. Prêteux, 2008. Proving video stream watermarking viability. SPIE Newsroom. 10.1117/2.1200806. 1174
-
(2008)
SPIE Newsroom
, pp. 1174
-
-
Mitrea, M.1
Duta, S.2
Prêteux, F.3
-
14
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
Ning, P., A. Liu and W. L. Du, 2008. Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sensor Networks (TOSN), 4:1-35.
-
(2008)
ACM Trans. Sensor Networks (TOSN)
, vol.4
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.L.3
-
15
-
-
0036738266
-
SPINS: Security protocols for sensor netowrks
-
Perrig, A., R. Szewczyk, J. D. Tygar, V. Wen and D. E. Culler, 2002. SPINS: Security protocols for sensor netowrks. Wireless Networks, 8:521-534.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
17
-
-
0345851235
-
Embedding the internet: Wireless integrated network sensors
-
Pottie, G. J. and W. J. Kaiser, 2000. Embedding the internet: Wireless integrated network sensors. Commun. ACM, 43:51-58.
-
(2000)
Commun. ACM
, vol.43
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
19
-
-
33746617289
-
ID modulation: Embedding sensor data in an RFID timeseries
-
Smith, J. R., B. Jiang, R. Sumit and P. Matthai, 2005. ID modulation: Embedding sensor data in an RFID timeseries. Lecture Notes Comput. Sci., 3727:234-246.
-
(2005)
Lecture Notes Comput. Sci
, vol.3727
, pp. 234-246
-
-
Smith, J.R.1
Jiang, B.2
Sumit, R.3
Matthai, P.4
|