-
1
-
-
33748074817
-
Data storage placement in sensor networks
-
Florence, Italy, May
-
B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006, pp. 344-355.
-
(2006)
ACM MobiHoc'06
, pp. 344-355
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
-
2
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
Urbana-Champaign, IL, USA, May
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
-
(2005)
ACM MobiHoc'05
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
3
-
-
33746086383
-
Distributed user access control in sensor networks
-
San Francisco, CA, June
-
H. Wang and Q. Li, "Distributed user access control in sensor networks," in DCOSS'06, San Francisco, CA, June 2006, pp. 305-320.
-
(2006)
DCOSS'06
, pp. 305-320
-
-
Wang, H.1
Li, Q.2
-
4
-
-
84863520818
-
Efficient and distributed access control in sensor networks
-
Santa Fe, New Mexico, USA, June
-
D. Liu, "Efficient and distributed access control in sensor networks," in DCOSS '07, Santa Fe, New Mexico, USA, June 2007.
-
(2007)
DCOSS '07
-
-
Liu, D.1
-
5
-
-
43549089535
-
Multi-user broadcast authentication in wireless sensor networks
-
San Diego, CA, June
-
K. Ren, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," in IEEE SECON'07, San Diego, CA, June 2007, pp. 223-232.
-
(2007)
IEEE SECON'07
, pp. 223-232
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
6
-
-
34548302064
-
pDCS: Security and privacy support for data-centric sensor networks
-
Anchorage, Alaska, USA, May
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007, pp. 1298-1306.
-
(2007)
IEEE INFOCOM'07
, pp. 1298-1306
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
7
-
-
33750012404
-
-
Y. Zhou, Y. Zhang, and Y. Fang, Access control in wireless sensor networks, Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, 5, no. 1, pp. 3-13, Jan. 2007.
-
Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, no. 1, pp. 3-13, Jan. 2007.
-
-
-
-
8
-
-
84869621366
-
-
ORION
-
ORION, http://www.joiscience.org/ocean-observing/advisors.
-
-
-
-
9
-
-
84869614604
-
-
NOPP
-
NOPP, http://www.nopp.org/.
-
-
-
-
10
-
-
84869605836
-
-
IOOS
-
IOOS, http://www.ocean.us/.
-
-
-
-
11
-
-
48049100992
-
Query privacy in wireless sensor networks
-
San Diego, CA, USA, June
-
B. Carbunar, Y. Yu, L. Shi, M. Pearce, and V. Vasudevan, "Query privacy in wireless sensor networks," in SECON '07, San Diego, CA, USA, June 2007, pp. 203-212.
-
(2007)
SECON '07
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, L.3
Pearce, M.4
Vasudevan, V.5
-
12
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme for pervasive computing environment
-
K. Ren, W. Lou, K. Kim, and R. Deng, "A novel privacy preserving authentication and access control scheme for pervasive computing environment," in IEEE Transactions on Vehicular Technology, 2006.
-
(2006)
IEEE Transactions on Vehicular Technology
-
-
Ren, K.1
Lou, W.2
Kim, K.3
Deng, R.4
-
13
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington, DC, Oct
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 62-72.
-
(2003)
ACM CCS'03
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
14
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in S&P'03, Oakland, CA, May 2003, pp. 197-213.
-
(2003)
S&P'03
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
15
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC, Oct
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 52-61.
-
(2003)
ACM CCS'03
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
16
-
-
33144476837
-
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, Location-based compromise tolerant security mechanisms for wireless sensor networks, IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, 24, no. 2, pp. 247-260, Feb. 2006.
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromise tolerant security mechanisms for wireless sensor networks," IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006.
-
-
-
-
17
-
-
0001604533
-
Blind signatures for untraceable payments
-
Springer-Verlag
-
D. Chaum, "Blind signatures for untraceable payments," in Advances in Cryptology - Crypto '82. Springer-Verlag (1983), 1982, pp. 199-203.
-
(1982)
Advances in Cryptology - Crypto '82
, pp. 199-203
-
-
Chaum, D.1
-
18
-
-
34848855786
-
Combating double-spending using cooperative P2P system
-
Toronto, Canada, June
-
I. Osipkov, E. Y. Vasserman, N. Hopper, and Y. Kim, "Combating double-spending using cooperative P2P system," in ICDCS'07, Toronto, Canada, June 2007.
-
(2007)
ICDCS'07
-
-
Osipkov, I.1
Vasserman, E.Y.2
Hopper, N.3
Kim, Y.4
-
19
-
-
84863504237
-
Distributed double spending prevention
-
Brno, Czech Republic, Apr
-
J.-H. Hoepman, "Distributed double spending prevention," in 15th Int. Workshop on Security Protocols, Brno, Czech Republic, Apr. 2007.
-
(2007)
15th Int. Workshop on Security Protocols
-
-
Hoepman, J.-H.1
-
20
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Oct
-
D. Chaum, "Security without identification: transaction systems to make big brother obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985.
-
(1985)
Comm. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
21
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sep
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: Security protocols for sensor networks," ACM Wireless Networks, vol. 8, no. 5, pp. 521-234, Sep. 2002.
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-234
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
22
-
-
34247376029
-
Securing the deluge network programming system
-
Nashville, Tennessee, Apr
-
P. Dutta, J. Hui, D. Chu, and D. Culler, "Securing the deluge network programming system," in IPSN'06, Nashville, Tennessee, Apr. 2006, pp. 326-333.
-
(2006)
IPSN'06
, pp. 326-333
-
-
Dutta, P.1
Hui, J.2
Chu, D.3
Culler, D.4
-
23
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Boston, MA, Aug
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus," in CHES'04, Boston, MA, Aug. 2004, pp. 119-132.
-
(2004)
CHES'04
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
24
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
Boston, MA, Aug
-
B. Karp and H. Kung, "GPSR: Greedy perimeter stateless routing for wireless networks," in ACM MOBICOM'00, Boston, MA, Aug. 2000, pp. 243-254.
-
(2000)
ACM MOBICOM'00
, pp. 243-254
-
-
Karp, B.1
Kung, H.2
-
25
-
-
33751069036
-
Double rulings for information brokerage in sensor networks
-
Los Angeles, California, USA, Sept
-
R. Sarkar, X. Zhu, and J. Gao, "Double rulings for information brokerage in sensor networks," in ACM MOBICOM'06, Los Angeles, California, USA, Sept. 2006, pp. 286-297.
-
(2006)
ACM MOBICOM'06
, pp. 286-297
-
-
Sarkar, R.1
Zhu, X.2
Gao, J.3
-
26
-
-
47949122909
-
Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming
-
P. Gupta and P. R. Kumar, Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming. Boston: Birkhauser, 1998, ch. Critical Power for Asymptotic Connectivity in Wireless Networks.
-
Boston: Birkhauser, 1998, ch. Critical Power for Asymptotic Connectivity in Wireless Networks
-
-
Gupta, P.1
Kumar, P.R.2
|