-
1
-
-
43149116953
-
Space-efficient identity based encryptionwithout pairings
-
D. Boneh, C. Gentry, and M. Hamburg. Space-efficient identity based encryptionwithout pairings. In IEEE FOCS, pp. 647-657, 2007.
-
(2007)
IEEE FOCS
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
2
-
-
29844437116
-
Localization and routing in sensor networks by local angle information
-
J. Bruck, J. Gao, and A. A. Jiang. Localization and routing in sensor networks by local angle information. In ACM MOBIHOC, pp. 181-192, 2005.
-
(2005)
ACM MOBIHOC
, pp. 181-192
-
-
Bruck, J.1
Gao, J.2
Jiang, A.A.3
-
3
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In INFOCOM, pp. 1917-1928, 2005.
-
(2005)
INFOCOM
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.-P.2
-
5
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
M. Conti, R. Di Pietro, L. Mancini, and A. Mei. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In ACM MobiHoc, pp. 80-89, 2007.
-
(2007)
ACM MobiHoc
, pp. 80-89
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.3
Mei, A.4
-
6
-
-
33750311730
-
Secure cooperative channel establishment inwireless sensor networks
-
M. Conti, R. D. Pietro, and L. V. Mancini. Secure cooperative channel establishment inwireless sensor networks. In IEEE PERCOMW, pp. 327-331, 2006.
-
(2006)
IEEE PERCOMW
, pp. 327-331
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
-
7
-
-
84944414611
-
Reinform: Reliable information forwarding using multiple paths in sensor networks
-
B. Deb, S. Bhatnagar, and B. Nath. Reinform: Reliable information forwarding using multiple paths in sensor networks. In 28th IEEE LCN, p. 406, 2003.
-
(2003)
28th IEEE LCN
, pp. 406
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
8
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM, 2004.
-
(2004)
IEEE INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
9
-
-
35548948372
-
Secure probabilistic location verification in randomly deployed wireless sensor networks
-
E. Ekici, J. McNair, and D. Al-Abri. Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw., 6(2):195-209, 2008.
-
(2008)
Ad Hoc Netw
, vol.6
, Issue.2
, pp. 195-209
-
-
Ekici, E.1
McNair, J.2
Al-Abri, D.3
-
10
-
-
0013043106
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. SIGMOBILE Mob. Comput. Commun. Rev., 5(4):11-25, 2001.
-
(2001)
SIGMOBILE Mob. Comput. Commun. Rev
, vol.5
, Issue.4
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
11
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In ACM MOBICOM, pp. 243-254, 2000.
-
(2000)
ACM MOBICOM
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MOBICOM, pp. 255-265, 2000.
-
(2000)
ACM MOBICOM
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In ACM IPSN, pp. 259-268, 2004.
-
(2004)
ACM IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
14
-
-
41849094781
-
Mitigating dos attacks against broadcast authentication in wireless sensor networks
-
1-35
-
P. Ning, A. Liu, and W. Du. Mitigating dos attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sen. Netw., 4(1):1-35, 2008.
-
(2008)
ACM Trans. Sen. Netw
, vol.4
, Issue.1
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
15
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE S&P, pp. 49-63, 2005.
-
(2005)
IEEE S&P
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84 on Advances in cryptology, pp. 47-53, 1985.
-
(1985)
CRYPTO 84 on Advances in cryptology
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
34547442398
-
Stardust: A flexible architecture for passive localization in wireless sensor networks
-
R. Stoleru, P. Vicaire, T. He, and J. A. Stankovic. Stardust: A flexible architecture for passive localization in wireless sensor networks. In ACM SENSYS, pp. 57-70, 2006.
-
(2006)
ACM SENSYS
, pp. 57-70
-
-
Stoleru, R.1
Vicaire, P.2
He, T.3
Stankovic, J.A.4
-
18
-
-
33746077211
-
On supporting distributed collaboration in sensor networks
-
G. Wang, W. Zhang, G. Cao, and T. Porta. On supporting distributed collaboration in sensor networks. In IEEE MILCOM, 2003.
-
(2003)
IEEE MILCOM
-
-
Wang, G.1
Zhang, W.2
Cao, G.3
Porta, T.4
-
19
-
-
55549085625
-
Location verification algorithms forwireless sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
Y. Wei, Z. Yu, and Y. Guan. Location verification algorithms forwireless sensor networks. In IEEE ICDCS, p. 70, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
IEEE ICDCS
, pp. 70
-
-
Wei, Y.1
Yu, Z.2
Guan, Y.3
-
20
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
21
-
-
33144479525
-
-
H. Yang, J. Shu, X. Meng, and S. Lu. SCAN: Self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):261-273, 2006.
-
H. Yang, J. Shu, X. Meng, and S. Lu. SCAN: Self-organized network layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):261-273, 2006.
-
-
-
-
22
-
-
48649109631
-
Efficient distributed detection of node replication attacks in sensor networks
-
B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy. Efficient distributed detection of node replication attacks in sensor networks. In IEEE ACSAC, pp. 257-267, 2007.
-
(2007)
IEEE ACSAC
, pp. 257-267
-
-
Zhu, B.1
Addada, V.G.K.2
Setia, S.3
Jajodia, S.4
Roy, S.5
|