-
1
-
-
34547484870
-
The tenet architecture for tiered sensor networks
-
Boulder, Colorado, USA, Oct
-
O. Gnawali, K.-Y. Jang, J. Paek, M. Vieira, R. Govindan, B. Greenstein, A. Joki, D. Estrin, and E. Kohler, "The tenet architecture for tiered sensor networks," in ACM SenSys'06, Boulder, Colorado, USA, Oct. 2006, pp. 153-166.
-
(2006)
ACM SenSys'06
, pp. 153-166
-
-
Gnawali, O.1
Jang, K.-Y.2
Paek, J.3
Vieira, M.4
Govindan, R.5
Greenstein, B.6
Joki, A.7
Estrin, D.8
Kohler, E.9
-
2
-
-
84905852894
-
TSAR: A two tier sensor storage architecture using interval skip graphs
-
San Diego, California, USA, Nov
-
P. Desnoyers, D. Ganesan, and P. Shenoy, "TSAR: A two tier sensor storage architecture using interval skip graphs," in ACM SenSys'05, San Diego, California, USA, Nov. 2005, pp. 39-50.
-
(2005)
ACM SenSys'05
, pp. 39-50
-
-
Desnoyers, P.1
Ganesan, D.2
Shenoy, P.3
-
3
-
-
51249105495
-
Rethinking data management for storage-centric sensor networks
-
Asilomar, CA, USA, Jan
-
Y. Diao, D. Ganesan, G. Mathur, and P. J. Shenoy, "Rethinking data management for storage-centric sensor networks," in Third Biennial Conference on Innovative Data Systems Research (CIDR'07), Asilomar, CA, USA, Jan. 2007, pp. 22-31.
-
(2007)
Third Biennial Conference on Innovative Data Systems Research (CIDR'07)
, pp. 22-31
-
-
Diao, Y.1
Ganesan, D.2
Mathur, G.3
Shenoy, P.J.4
-
4
-
-
33748074817
-
Data storage placement in sensor networks
-
Florence, Italy, May
-
B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006, pp. 344-355.
-
(2006)
ACM MobiHoc'06
, pp. 344-355
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
-
5
-
-
70349652889
-
Verifiable privacy-preserving range query in twotiered sensor networks
-
Phoenix, AZ, April
-
B. sheng and Q. Li, "Verifiable privacy-preserving range query in twotiered sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, April 2008, pp. 46-50.
-
(2008)
IEEE INFOCOM'08
, pp. 46-50
-
-
sheng, B.1
Li, Q.2
-
6
-
-
4243197464
-
Multi-dimensional range queries in sensor networks
-
Los Angeles, California, USA, Nov
-
X. Li, Y. J. Kim, R. Govindan, and W. Hong, "Multi-dimensional range queries in sensor networks," in ACM SenSys'03, Los Angeles, California, USA, Nov. 2003, pp. 63-75.
-
(2003)
ACM SenSys'03
, pp. 63-75
-
-
Li, X.1
Kim, Y.J.2
Govindan, R.3
Hong, W.4
-
7
-
-
23944487783
-
TinyDB: An acquisitional query processing system for sensor networks
-
Mar
-
S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: an acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005.
-
(2005)
ACM Trans. Database Syst
, vol.30
, Issue.1
, pp. 122-173
-
-
Madden, S.R.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
8
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin
-
H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in ACM SIGMOD'02, Madison, Wisconsin, 6 2002, pp. 216-227.
-
(2002)
ACM SIGMOD'02
, vol.6
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
9
-
-
85065578926
-
A privacy-preserving index for range queries
-
Toronto, Canada, Aug
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Thirtieth international conference on Very large data bases (VLDB'04), Toronto, Canada, Aug. 2004, pp. 720-731.
-
(2004)
Thirtieth international conference on Very large data bases (VLDB'04)
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
10
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
11
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
Urbana-Champaign, IL, USA, May
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
-
(2005)
ACM MobiHoc'05
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
12
-
-
41449098948
-
LEDS: Providing location-aware endto-end data security in wireless sensor networks
-
May
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware endto-end data security in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008.
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
13
-
-
33947309703
-
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, Secure localization and authentication in ultra-wideband sensor networks, IEEE J. Select. Areas Commun., Special Issue on UWB Wireless Communications - Theory and Applications, 24, no. 4, pp. 829-835, Apr. 2006.
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Select. Areas Commun., Special Issue on UWB Wireless Communications - Theory and Applications, vol. 24, no. 4, pp. 829-835, Apr. 2006.
-
-
-
-
14
-
-
33750012404
-
-
Y. Zhou, Y. Zhang, and Y. Fang, Access control in wireless sensor networks, Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, 5, no. 1, pp. 3-13, Jan. 2007.
-
Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, no. 1, pp. 3-13, Jan. 2007.
-
-
-
-
15
-
-
34547411877
-
A two-layer key establishment scheme for wireless sensor networks
-
September
-
Y. Zhou and Y. Fang, "A two-layer key establishment scheme for wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 6, no. 9, pp. 1009-1020, September 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
-
16
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, Nov
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS'02, Washington, DC, Nov. 2002, pp. 41-47.
-
(2002)
ACM CCS'02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
17
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Washington, DC, Oct
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in ACM CCS, Washington, DC, Oct. 2003, pp. 42-51.
-
(2003)
ACM CCS
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
18
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC, Oct
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 52-61.
-
(2003)
ACM CCS'03
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
19
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
Philadelphia, PA, Oct
-
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in ACM WiSe'04, Philadelphia, PA, Oct. 2004, pp. 21-30.
-
(2004)
ACM WiSe'04
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
20
-
-
33144476837
-
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, Location-based compromise tolerant security mechanisms for wireless sensor networks, IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, 24, no. 2, pp. 247-260, Feb. 2006.
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromise tolerant security mechanisms for wireless sensor networks," IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006.
-
-
-
-
21
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
Berkeley, CA, USA, May
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, "SWATT: Software-based attestation for embedded devices," in IEEE Symposium on Security and Privacy, Berkeley, CA, USA, May 2004, pp. 272-282.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
van Doorn, L.3
Khosla, P.K.4
-
22
-
-
33747142749
-
The capacity of wireless networks
-
Mar
-
P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.2
|