-
1
-
-
13944283393
-
A survey on routing protocols for wireless sensor networks
-
K. Akkaya and M. F. Younis. A survey on routing protocols for wireless sensor networks Ad Hoc Networks, 3(3):325-349, 2005
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.3
, pp. 325-349
-
-
Akkaya, K.1
Younis, M.F.2
-
2
-
-
0001229355
-
A forward-secure digital signature scheme
-
M. Bellare and S. Miner. A forward-secure digital signature scheme. In CRYPTO 1999
-
(1999)
CRYPTO
-
-
Bellare, M.1
Miner, S.2
-
4
-
-
1542317846
-
An authentication framework for hierarchical ad hoc sensor networks
-
M. Bohge and W. Trappa. An authentication framework for hierarchical ad hoc sensor networks. In ACM Workshop on Wireless Security, 2003.
-
(2003)
ACM Workshop on Wireless Security
-
-
Bohge, M.1
Trappa, W.2
-
5
-
-
65249169987
-
Posh: Proactive co-operative self-healing in unattended wireless sensor networks
-
R. Di Pietro, D. Ma, C. Soriente, and G. Tsudik. Posh: Proactive co-operative self-healing in unattended wireless sensor networks. In IEEE SEDS, 2008.
-
(2008)
IEEE SEDS
-
-
Di Pietro, R.1
Ma, D.2
Soriente, C.3
Tsudik, G.4
-
6
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik. Catch me (if you can): Data survival in unattended sensor networks. In IEEE PerCom, 2008.
-
(2008)
IEEE PerCom
-
-
Di Pietro, R.1
Mancini, L.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
7
-
-
70349238414
-
Playing hide-and seek with a focused mobile adversary. Cryptology ePrint Archive
-
Report 2008/293
-
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik. Playing hide-and seek with a focused mobile adversary. Cryptology ePrint Archive, Report 2008/293, 2008
-
(2008)
-
-
Di Pietro, R.1
Mancini, L.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
8
-
-
79955515260
-
A generic construction for intrusion-resilient public key encryption
-
Y. Dobis, M. Franklin, J. Katz, A. Miyaji, and M. Yung. A generic construction for intrusion-resilient public key encryption. In CT-RSA, 2004.
-
(2004)
CT-RSA
-
-
Dobis, Y.1
Franklin, M.2
Katz, J.3
Miyaji, A.4
Yung, M.5
-
10
-
-
70349242903
-
-
Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In PKC, 2003
-
Y. Dodis, J. Katz, S. Xu, and M. Yung. Strong key-insulated signature schemes. In PKC, 2003
-
-
-
-
11
-
-
33144472210
-
-
S. Ganeriwal, S. Capkun, C. Han, and M. Srivastava Secure time synchronization service for sensor networks. In WiSe, 2005.
-
S. Ganeriwal, S. Capkun, C. Han, and M. Srivastava Secure time synchronization service for sensor networks. In WiSe, 2005.
-
-
-
-
12
-
-
70349257006
-
-
G. Itkis. Intrusion-resilient signatures: Generic constructions. In SCN, 2002.
-
G. Itkis. Intrusion-resilient signatures: Generic constructions. In SCN, 2002.
-
-
-
-
13
-
-
84871980827
-
SiBIR: Signer-base intrusion-resilient signatures
-
G. Itkis and L. Reyzin. SiBIR: Signer-base intrusion-resilient signatures. In CRYPTO, 2002
-
(2002)
CRYPTO
-
-
Itkis, G.1
Reyzin, L.2
-
15
-
-
84904163618
-
Extended abstract: Forword-secure sequential aggregate authentication
-
D. Ma and G. Tsudik. Extended abstract: Forword-secure sequential aggregate authentication. In IEEE S&P, 2007.
-
(2007)
IEEE S&P
-
-
Ma, D.1
Tsudik, G.2
-
16
-
-
70349236707
-
DISH: Distributed Self-Healing
-
in Unattended Sensor Networks
-
D. Ma and G. Tsudik. DISH: Distributed Self-Healing (in Unattended Sensor Networks). In SSS, 2008.
-
(2008)
In SSS
-
-
Ma, D.1
Tsudik, G.2
-
18
-
-
29844441128
-
Arbaugh Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. A Arbaugh Toward resilient security in wireless sensor networks. In ACM MobiHoc, 2005.
-
(2005)
ACM MobiHoc
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
-
19
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In IEEE INFOCOM, 2004.
-
(2004)
IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
20
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
W. Zhang and G. Cao. Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. In IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Zhang, W.1
Cao, G.2
-
21
-
-
33847095965
-
The interleaved authentication for filtering false reports in multipath routing based sensor networks
-
Y. Zhang J. Yang, and H. T. Vu. The interleaved authentication for filtering false reports in multipath routing based sensor networks. In IPDPS, 2006.
-
(2006)
IPDPS
-
-
Zhang, Y.1
Yang, J.2
Vu, H.T.3
-
22
-
-
34548390509
-
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
-
S. Zhu S. Setia, S. Jajodia, and P. Ning. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN, 3(3) 2007.
-
(2007)
TOSN
, vol.3
, Issue.3
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
|