-
1
-
-
25644450392
-
Perfect Simulation and Stationary of a Class of Moblity Models
-
pages
-
J.-Y. L. Boudec and M. Vojnović. Perfect Simulation and Stationary of a Class of Moblity Models. In IEEE INFOCOM, pages:2743-2754, 2005.
-
(2005)
IEEE INFOCOM
, pp. 2743-2754
-
-
Boudec, J.-Y.L.1
Vojnović, M.2
-
3
-
-
37849004592
-
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
-
pages
-
M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. In ACM Mobihoc, pages:80-89, 2007.
-
(2007)
ACM Mobihoc
, pp. 80-89
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
4
-
-
33744928874
-
-
pages
-
K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. S. Sukhatme. Robomote: Enabling Mobility in Sensor Networks In IEEE IPSN, pages:404-409, 2005.
-
(2005)
Robomote: Enabling Mobility in Sensor Networks In IEEE IPSN
, pp. 404-409
-
-
Dantu, K.1
Rahimi, M.2
Shah, H.3
Babel, S.4
Dhariwal, A.5
Sukhatme, G.S.6
-
5
-
-
11244273945
-
Localization for Mobile Sensor Networks
-
pages
-
L. Hu and D. Evans. Localization for Mobile Sensor Networks. In ACM Mobicom, pages:45-57, 2004.
-
(2004)
ACM Mobicom
, pp. 45-57
-
-
Hu, L.1
Evans, D.2
-
6
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
pages
-
J. Jung, V. Paxon, A.W Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy, pages:211-225, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxon, V.2
Berger, A.W.3
Balakrishnan, H.4
-
7
-
-
51249109865
-
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
-
Technical Report TR-2007-36, North Carolina State University, Department of Computer Science, November
-
A. Liu and P. Ning. TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In Technical Report TR-2007-36, North Carolina State University, Department of Computer Science, November 2007.
-
(2007)
-
-
Liu, A.1
Ning, P.2
-
9
-
-
27544460282
-
Distributed Detection of Node Replication Attacks in Sensor Networks
-
pages:, May
-
B. Parno, A. Perrig, and V.D. Gligor. Distributed Detection of Node Replication Attacks in Sensor Networks. In IEEE Symposium on Security and Privacy, pages:49-63, May 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
10
-
-
33749987832
-
Attack-resilient Time Synchronization for Wireless Sensor Networks
-
January
-
H. Song, S. Zhu, and G. Cao. Attack-resilient Time Synchronization for Wireless Sensor Networks. Ad Hoc Networks, 5(1):112-125, January 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 112-125
-
-
Song, H.1
Zhu, S.2
Cao, G.3
-
11
-
-
34547282118
-
TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks
-
pages
-
K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou. TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks. In ACM CCS, pages:264-271, 2006.
-
(2006)
ACM CCS
, pp. 264-271
-
-
Sun, K.1
Ning, P.2
Wang, C.3
Liu, A.4
Zhou, Y.5
-
12
-
-
51849154670
-
Real-time Detection of Clone Attacks in Wireless Sensor Networks
-
pages
-
K. Xing, F. Liu, X. Cheng, and H.C. Du. Real-time Detection of Clone Attacks in Wireless Sensor Networks. In IEEE ICDCS, pages:3-10, 2008.
-
(2008)
IEEE ICDCS
, pp. 3-10
-
-
Xing, K.1
Liu, F.2
Cheng, X.3
Du, H.C.4
-
14
-
-
51849154205
-
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control
-
pages
-
H. Wang, B. Sheng, C.C. Tan, and Q. Li. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control. In IEEE ICDCS, pages:11-18, 2008.
-
(2008)
IEEE ICDCS
, pp. 11-18
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
|