-
1
-
-
84876154089
-
High-performance low power sensor platforms featuring gigabyte scale storage
-
A. Mitra, A. Banerjee, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D. Gunopulos, "High-performance low power sensor platforms featuring gigabyte scale storage," in Proc. MobiQuitous, 2005.
-
(2005)
Proc. MobiQuitous
-
-
Mitra, A.1
Banerjee, A.2
Najjar, W.3
Zeinalipour-Yazti, D.4
Kalogeraki, V.5
Gunopulos, D.6
-
2
-
-
35348872361
-
Capsule: An energy-optimized object storage system for memory-constrained sensor devices
-
G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, "Capsule: An energy-optimized object storage system for memory-constrained sensor devices," in Proc. ACM Sensys, 2006.
-
(2006)
Proc. ACM Sensys
-
-
Mathur, G.1
Desnoyers, P.2
Ganesan, D.3
Shenoy, P.4
-
3
-
-
84869610942
-
-
"Mica motes," http://www.xbow.com/Products/.
-
-
-
Mica motes1
-
5
-
-
38049010337
-
Tsar: A two tier sensor storage architecture using interval skip graphs
-
P. Desnoyers, D. Ganesan, and P. Shenoy, "Tsar: a two tier sensor storage architecture using interval skip graphs," in Proc. ACM Sensys, 2005.
-
(2005)
Proc. ACM Sensys
-
-
Desnoyers, P.1
Ganesan, D.2
Shenoy, P.3
-
6
-
-
84869609167
-
-
"Mica z," http://www.xbow.com/Products/.
-
-
-
Mica z1
-
7
-
-
3543100577
-
Stastical en-route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Stastical en-route filtering of injected false data in sensor networks," in Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
8
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Sep
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "Spins: Security protocols for sensor networks," ACM Wireless Networks, Sep. 2002.
-
(2002)
ACM Wireless Networks
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
9
-
-
33646834914
-
A new approach for random key predistribution in large-scale wireless sensor networks
-
K. Ren, K. Zeng, and W. Lou, "A new approach for random key predistribution in large-scale wireless sensor networks," Journal of Wireless Communication and Mobile Computing, vol. 6, no. 3, pp. 307-318, 2006.
-
(2006)
Journal of Wireless Communication and Mobile Computing
, vol.6
, Issue.3
, pp. 307-318
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
-
10
-
-
41449098948
-
Leds: Providing location-aware endto-end data security in wireless sensor networks
-
May
-
K. Ren, W. Lou, and Y. Zhang, "Leds: Providing location-aware endto-end data security in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
12
-
-
34249316910
-
Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
-
J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks," Ad Hoc Networks, Elsevier, vol. 5, no. 7, pp. 1073-1089, 2007.
-
(2007)
Ad Hoc Networks, Elsevier
, vol.5
, Issue.7
, pp. 1073-1089
-
-
Girao, J.1
Westhoff, D.2
Mykletun, E.3
Araki, T.4
-
13
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
R. D. Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch me (if you can): Data survival in unattended sensor networks," in Proc. IEEE PerCom, 2008.
-
(2008)
Proc. IEEE PerCom
-
-
Pietro, R.D.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
15
-
-
35048880121
-
Dependable and secure data storage in wireless ad hoc networks: An assessment of ds2
-
S. Chessa, R. D. Pietro, and P. Maestrini, "Dependable and secure data storage in wireless ad hoc networks: an assessment of ds2," in Proc. WONS, 2004.
-
(2004)
Proc. WONS
-
-
Chessa, S.1
Pietro, R.D.2
Maestrini, P.3
-
16
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks," in Proc. ACM MOBIHOC, 2005.
-
(2005)
Proc. ACM MOBIHOC
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
18
-
-
34547645758
-
Securing distributed data storage and retrieval in sensor networks
-
N. Subramanian, C. Yang, and W. Zhang, "Securing distributed data storage and retrieval in sensor networks," in Proc. IEEE PerCom, 2007.
-
(2007)
Proc. IEEE PerCom
-
-
Subramanian, N.1
Yang, C.2
Zhang, W.3
-
19
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
April
-
M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," Journal of the ACM, vol. 36, no. 2, pp. 335-348, April 1989.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
20
-
-
85028765277
-
Advances in Cryptology (CRYPTO'92), LNCS
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Advances in Cryptology (CRYPTO'92), LNCS, vol. 740, pp. 471-486, 1993.
-
(1993)
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
21
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
2442531720
-
Algebraic signature for scalable distributed data structure
-
W. Litwin and T. Schwarz, "Algebraic signature for scalable distributed data structure," in Proc. ICDE, 2004.
-
(2004)
Proc. ICDE
-
-
Litwin, W.1
Schwarz, T.2
-
24
-
-
70349675101
-
Verification of parity data in large scale storage systems
-
T. Schwarz, "Verification of parity data in large scale storage systems," in Proc. PDPTA, 2004.
-
(2004)
Proc. PDPTA
-
-
Schwarz, T.1
-
25
-
-
33947694320
-
Store, forget and check: Using algebraic signature to check remotely administered storage
-
T. Schwarz and E. Miller, "Store, forget and check: Using algebraic signature to check remotely administered storage," in Proc. ICDCS, 2006.
-
(2006)
Proc. ICDCS
-
-
Schwarz, T.1
Miller, E.2
|