-
1
-
-
0036688074
-
A Survey on Sensor Networks
-
Aug.
-
F. Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-14.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, F.1
-
2
-
-
85116610435
-
Next Century Challenges: Mobile Networking for Smart Dust
-
J. M. Kahn, R. H. Katz, and K. S. J. Pister, "Next Century Challenges: Mobile Networking for Smart Dust," Proc. ACM Int'l. Conf. Mobile Computing and Networking (MobiCom'99), Aug. 1999, pp. 217-78.
-
Proc. ACM Int'l. Conf. Mobile Computing and Networking (MobiCom'99), Aug. 1999
, pp. 217-278
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.S.J.3
-
3
-
-
0345851235
-
Wireless Integrated Network Sensors
-
May
-
G. J. Pottie and W. J. Kaiser, "Wireless Integrated Network Sensors," Commun. ACM, vol. 43, no. 5, May 2000, pp. 51-58.
-
(2000)
Commun. ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
4
-
-
84880503042
-
-
Crossbow Technology
-
Crossbow Technology; http://www.xbow.com/, 2006.
-
(2006)
-
-
-
5
-
-
84880454028
-
-
Atmel Corporation; http://www.atmel.com/, 2006.
-
(2006)
-
-
-
7
-
-
0036793924
-
Denial of Service in Sensor Networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer Mag., vol. 35, no. 10, Oct. 2002, pp. 54-62.
-
(2002)
IEEE Computer Mag.
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
-
8
-
-
4243082091
-
Security in Wireless Sensor Networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Commun. ACM, vol. 47, no. 6, June 2004, pp. 53-57.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
9
-
-
11144340927
-
Designing Secure Sensor Networks
-
Dec
-
E. Shi and A. Perrig, "Designing Secure Sensor Networks," IEEE Wireless Commun. Mag., vol. 11, no. 6, Dec 2004, pp. 38-43.
-
(2004)
IEEE Wireless Commun. Mag.
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
10
-
-
10644250089
-
Security Considerations in Ad Hoc Sensor Networks
-
F. Hu and N. K. Sharma, "Security Considerations in Ad Hoc Sensor Networks," Elsevier Ad Hoc Networks, vol. 3, no. 1, 2005, pp. 69-89.
-
(2005)
Elsevier Ad Hoc Networks
, vol.3
, Issue.1
, pp. 69-89
-
-
Hu, F.1
Sharma, N.K.2
-
11
-
-
35348910049
-
Wireless Sensor Network Security: A Survey
-
Ed. Y. Xiao, Auerbach Publications, CRC Press
-
J. P. Walters and Z. Liang, "Wireless Sensor Network Security: A Survey," Security in Distributed, Grid, and Pervasive Computing, Ed. Y. Xiao, Auerbach Publications, CRC Press, 2006.
-
(2006)
Security in Distributed, Grid, and Pervasive Computing
-
-
Walters, J.P.1
Liang, Z.2
-
12
-
-
36349021963
-
Security for Wireless Sensor Networks: Overview
-
Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers
-
S. Avancha et al., "Security for Wireless Sensor Networks: Overview," Wireless Sensor Networks, Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers, 2004.
-
(2004)
Wireless Sensor Networks
-
-
Avancha, S.1
-
13
-
-
36349021963
-
Security for Sensor Networks: Key Management
-
Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers
-
H. Chan and A. Perrig, "Security for Sensor Networks: Key Management," Wireless Sensor Networks, Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers, 2004.
-
(2004)
Wireless Sensor Networks
-
-
Chan, H.1
Perrig, A.2
-
14
-
-
62549136217
-
Security in Sensor Networks: Watermarking Techniques
-
Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers
-
J. Wong et al., "Security in Sensor Networks: Watermarking Techniques," Wireless Sensor Networks, Ed. C. S. Raghavendra, K. M. Sivalingam, and T. Znati, Kluwer Academic Publishers, 2004.
-
(2004)
Wireless Sensor Networks
-
-
Wong, J.1
-
16
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
Oct.
-
C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Sys. Tech. J., vol. 28, Oct. 1949, pp. 656-715.
-
(1949)
Bell Sys. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
17
-
-
0017018484
-
New Directions in Cryptography
-
W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Info. Theory, vol. IT-22, no. 6, 1976, pp. 644-54.
-
(1976)
IEEE Trans. Info. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
18
-
-
0017930809
-
METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Commun. ACM, vol. 21, no. 2, Feb. 1978, pp. 120-26. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
Sept.
-
A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," ACM Wireless Networks, vol. 8, no. 5, Sept. 2002, pp. 521-34.
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
-
23
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
Advances in Cryptology: Proc. EUROCRYPT'84, Springer-Verlag
-
R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Advances in Cryptology: Proc. EUROCRYPT'84, Lecture Notes in Computer Science, Springer-Verlag, vol. 209, 1985, pp. 335-38.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
24
-
-
85028765277
-
Perfectly Secure Key Distribution for Dynamic Conferences
-
Advances in Cryptology: Proc. CRYPTO' 92, Springer-Verlag
-
C. Blundo et al., "Perfectly Secure Key Distribution for Dynamic Conferences," Advances in Cryptology: Proc. CRYPTO' 92, Lecture Notes in Computer Science, Springer-Verlag, vol. 740, 1992, pp. 471-86.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
-
25
-
-
0038341106
-
A Key Management Scheme for Distributed Sensor Networks
-
L. Eschenauer and V. Gligor, "A Key Management Scheme for Distributed Sensor Networks," Proc. 9th ACM Conf. Computer and Communications Security (CCS'02), Washington, DC, Nov. 2002.
-
Proc. 9th ACM Conf. Computer and Communications Security (CCS'02), Washington, DC, Nov. 2002
-
-
Eschenauer, L.1
Gligor, V.2
-
26
-
-
14844287958
-
The Strange Logic of Random Graphs
-
Springer-Verlag
-
J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag 2000.
-
(2000)
Algorithms and Combinatorics
, vol.22
-
-
Spencer, J.1
-
27
-
-
28444433009
-
Random Key Predistribution Schemes for Sensor Networks
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," Proc. 2003 IEEE Symp. Security and Privacy, May 2003, pp. 197-213.
-
Proc. 2003 IEEE Symp. Security and Privacy, May 2003
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
29
-
-
4544301464
-
Random Key-Assignment for Secure Wireless Sensor Networks
-
R. D. Pietro, L. V. Mancini, and A. Mei, "Random Key-Assignment for Secure Wireless Sensor Networks," Proc. 10th ACM Conf. Computer and Communications Security (CCS'03), Washington, DC, Oct. 2003.
-
Proc. 10th ACM Conf. Computer and Communications Security (CCS'03), Washington, DC, Oct. 2003
-
-
Pietro, R.D.1
Mancini, L.V.2
Mei, A.3
-
31
-
-
3042822764
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," Proc. 10th ACM Conf. Computer and Communications Security (CCS'03), Washington, DC, Oct. 2003.
-
Proc. 10th ACM Conf. Computer and Communications Security (CCS'03), Washington, DC, Oct. 2003
-
-
Liu, D.1
Ning, P.2
-
32
-
-
14844335004
-
Revisiting Random Key Pre-Distribution Schemes for Wireless Sensor Networks
-
J. Hwang and Y. Kim, "Revisiting Random Key Pre-Distribution Schemes for Wireless Sensor Networks," Proc. 2nd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'04), Washington, DC, Oct. 2004.
-
Proc. 2nd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'04), Washington, DC, Oct. 2004
-
-
Hwang, J.1
Kim, Y.2
-
33
-
-
24144503356
-
Deterministic Key Pre-Distribution Schemes for Distributed Sensor Networks
-
Proc. 11th Int'l. Wksp. Selected Areas in Cryptography (SAC'04), Springer-Verlag
-
J. Lee and D. R. Stinson, "Deterministic Key Pre-Distribution Schemes for Distributed Sensor Networks," Proc. 11th Int'l. Wksp. Selected Areas in Cryptography (SAC'04), Lecture Notes in Computer Science, Springer-Verlag, vol. 3357/2004, 2004, pp. 294-307.
-
(2004)
Lecture Notes in Computer Science
, vol.3357
, Issue.2004
, pp. 294-307
-
-
Lee, J.1
Stinson, D.R.2
-
35
-
-
33646839571
-
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
-
S. A. Camtepe and B. Yener, "Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks," Proc. 9th European Symp. Research in Computer Security (ESORICS 2004), Sophia Antipolis, France, Sept. 2004.
-
Proc. 9th European Symp. Research in Computer Security (ESORICS 2004), Sophia Antipolis, France, Sept. 2004
-
-
Camtepe, S.A.1
Yener, B.2
-
37
-
-
34250197583
-
A Scalable Key Agreement Scheme for Large Scale Networks
-
Y. Zhou and Y. Fang, "A Scalable Key Agreement Scheme for Large Scale Networks," Proc. 2006 IEEE Int'l. Conf. Networking, Sensing and Control (ICNSC'06), Ft. Lauderdale, Florida, Apr. 2006.
-
Proc. 2006 IEEE Int'l. Conf. Networking, Sensing and Control (ICNSC'06), Ft. Lauderdale, Florida, Apr. 2006
-
-
Zhou, Y.1
Fang, Y.2
-
38
-
-
37049001818
-
Scalable and Deterministic Key Agreement for Large Scale Networks
-
Nov.
-
Y. Zhou and Y. Fang, "Scalable and Deterministic Key Agreement for Large Scale Networks," IEEE Trans. Wireless Commun., vol. 6, no. 11, Nov. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.11
-
-
Zhou, Y.1
Fang, Y.2
-
39
-
-
25844435733
-
PIKE: Peer Intermediaries for Key Establishment in Sensor Networks
-
H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment in Sensor Networks," Proc. 24th Annual IEEE Joint Conf. IEEE Computer and Communications Societies (INFOCOM'05), Miami, FL, Mar. 2005.
-
Proc. 24th Annual IEEE Joint Conf. IEEE Computer and Communications Societies (INFOCOM'05), Miami, FL, Mar. 2005
-
-
Chan, H.1
Perrig, A.2
-
40
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
DOI 10.1145/1053283.1053287
-
D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Trans. Info. and System Security, vol. 8, no. 1, Feb. 2005, pp. 41-77. (Pubitemid 40479429)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Rongfang, L.I.3
-
42
-
-
39049083533
-
Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme
-
F. Delgosha and F. Fekri, "Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme," Proc. the 25th Annual IEEE Joint Conf. IEEE Computer and Communications Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006.
-
Proc. The 25th Annual IEEE Joint Conf. IEEE Computer and Communications Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006
-
-
Delgosha, F.1
Fekri, F.2
-
43
-
-
4544293215
-
Location-Based Pairwise Key Establishments for Relatively Static Sensor Networks
-
D. Liu and P. Ning, "Location-Based Pairwise Key Establishments for Relatively Static Sensor Networks," Proc. 2003 ACM Wksp. Security of Ad Hoc and Sensor Networks(SASN'03), Fairfax, VA, Oct. 2003.
-
Proc. 2003 ACM Wksp. Security of Ad Hoc and Sensor Networks(SASN'03), Fairfax, VA, Oct. 2003
-
-
Liu, D.1
Ning, P.2
-
46
-
-
24944442139
-
A Robust Group-Based Key Management Scheme for Wireless Sensor Networks
-
Z. Yu and Y. Guan, "A Robust Group-Based Key Management Scheme for Wireless Sensor Networks," Proc. 2005 IEEE Wireless Commun.and Networking Conf. (WCNC'05), New Orleans, LA, Mar. 2005.
-
Proc. 2005 IEEE Wireless Commun.And Networking Conf. (WCNC'05), New Orleans, LA, Mar. 2005
-
-
Yu, Z.1
Guan, Y.2
-
47
-
-
24944580409
-
LLK: A Link-Layer Key Establishment Scheme in Wireless Sensor Networks
-
Y. Zhou, Y. Zhang, and Y. Fang, "LLK: A Link-Layer Key Establishment Scheme in Wireless Sensor Networks," Proc. 2005 IEEE Wireless Commun. and Networking Conf. (WCNC'05), New Orleans, LA, Mar. 2005.
-
Proc. 2005 IEEE Wireless Commun. And Networking Conf. (WCNC'05), New Orleans, LA, Mar. 2005
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
48
-
-
33847342853
-
Key Establishment in Sensor Networks Based on Triangle Grid Deployment Model
-
Y. Zhou, Y. Zhang, and Y. Fang, "Key Establishment in Sensor Networks Based on Triangle Grid Deployment Model," Proc. 2005 IEEE Military Communications Conf. (MILCOM'05), Atlantic City, NJ, Oct. 2005.
-
Proc. 2005 IEEE Military Communications Conf. (MILCOM'05), Atlantic City, NJ, Oct. 2005
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
49
-
-
35148823592
-
Scalable Link-Layer Key Agreement in Sensor Networks
-
Y. Zhou and Y. Fang, "Scalable Link-Layer Key Agreement in Sensor Networks," Proc. 2006 IEEE Military Communications Conf. (MILCOM'06), Washington, DC, Oct. 2005.
-
Proc. 2006 IEEE Military Communications Conf. (MILCOM'06), Washington, DC, Oct. 2005
-
-
Zhou, Y.1
Fang, Y.2
-
50
-
-
34547411877
-
A two-layer key establishment scheme for wireless sensor networks
-
DOI 10.1109/TMC.2007.1008
-
Y. Zhou and Y. Fang, "A Two-Layer Key Establishment Scheme for Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 9, Sept. 2007, pp. 1009-20. (Pubitemid 47171282)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
-
51
-
-
33749033368
-
Group-Based Key Pre-Distribution in Wireless Sensor Networks
-
D. Liu, P. Ning, and W. Du, "Group-Based Key Pre-Distribution in Wireless Sensor Networks," Proc. 4th ACM Wksp. Wireless Security (WiSe'05), Cologne, Germany, Sept. 2005.
-
Proc. 4th ACM Wksp. Wireless Security (WiSe'05), Cologne, Germany, Sept. 2005
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
52
-
-
33646400365
-
Efficient Key Establishment for Group-Based Wireless Sensor Deployments
-
L. Zhou, J. Ni, and C.V. Ravishankar, "Efficient Key Establishment for Group-Based Wireless Sensor Deployments," Proc. 4th ACM Wksp. Wireless Security (WiSe'05), Cologne, Germany, Sept. 2005.
-
Proc. 4th ACM Wksp. Wireless Security (WiSe'05), Cologne, Germany, Sept. 2005
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.V.3
-
53
-
-
39049087772
-
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
-
L. Zhou, J. Ni, and C. V. Ravishankar, "Supporting Secure Communication and Data Collection in Mobile Sensor Networks," Proc. the 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006.
-
Proc. The 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006
-
-
Zhou, L.1
Ni, J.2
Ravishankar, C.V.3
-
55
-
-
10044284351
-
LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Conf. Computer and Commun. Security (CCS'03), Washington, DC, Oct. 2003.
-
Proc. 10th ACM Conf. Computer and Commun. Security (CCS'03), Washington, DC, Oct. 2003
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
57
-
-
34247342679
-
An Efficient Key Establishment Scheme for Secure Aggregating Sensor Networks
-
E-O Blab and M. Zitterbart, "An Efficient Key Establishment Scheme for Secure Aggregating Sensor Networks," Proc. 2006 ACM Symp. Information, Computer and Commun. Security (ASIACCS'06), Taipei, Taiwan, Mar. 2006.
-
Proc. 2006 ACM Symp. Information, Computer and Commun. Security (ASIACCS'06), Taipei, Taiwan, Mar. 2006
-
-
Blab, E.-O.1
Zitterbart, M.2
-
58
-
-
17744386714
-
Key Infection: Smart Trust for Smart Dust
-
R. Anderson, H. Chan, and A. Perrig, "Key Infection: Smart Trust for Smart Dust," Proc. 12th IEEE Int'l. Conf. Network Protocols (ICNP'04), Berlin, Germany, Oct. 2004.
-
Proc. 12th IEEE Int'l. Conf. Network Protocols (ICNP'04), Berlin, Germany, Oct. 2004
-
-
Anderson, R.1
Chan, H.2
Perrig, A.3
-
59
-
-
39049089652
-
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
-
M. J. Miller and N. H. Vaidya, "Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks," Proc. 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006.
-
Proc. 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006
-
-
Miller, M.J.1
Vaidya, N.H.2
-
61
-
-
33748968113
-
LIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
-
P. Traynor et al., "LIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks," Proc. 4th Int'l. Conf. Mobile Systems, Applications and Services (MobiSys'06), Uppsala, Sweden, June 2006.
-
Proc. 4th Int'l. Conf. Mobile Systems, Applications and Services (MobiSys'06), Uppsala, Sweden, June 2006
-
-
Traynor, P.1
-
64
-
-
23944459661
-
Public Key Cryptography in Sensor Networks - Revisited
-
Proc. 1st European Wksp. Security in Ad Hoc and Sensor Networks (ESAS'04), Heidelberg, Germany, Aug. 2004, Revised Selected Papers, Springer-Verlag
-
G. Gaubatz, J. Kaps, and B. Sunar, "Public Key Cryptography in Sensor Networks - Revisited," Proc. 1st European Wksp. Security in Ad Hoc and Sensor Networks (ESAS'04), Heidelberg, Germany, Aug. 2004, Revised Selected Papers, Lecture Notes in Computer Science, Springer-Verlag, vol. 3313/2005, 2005, pp. 2-18.
-
(2005)
Lecture Notes in Computer Science
, vol.3313
, Issue.2005
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.2
Sunar, B.3
-
66
-
-
84947808606
-
NTRU: A Ring-Based Public Key Cryptosystem
-
Proc. ANTS III, Springer-Verlag
-
J. Hoffstein, J. Pipher, and J. H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Proc. ANTS III, Lecture Notes in Computer Science, Springer-Verlag, vol. 1423/1998, 1998, pp. 267-88.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, Issue.1998
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
67
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, 1987, pp. 203-9.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
68
-
-
85015402934
-
Uses of Elliptic Curves in Cryptography
-
Proc. Advances in Cryptology - CRYPTO'85, Springer-Verlag
-
V. Miller, "Uses of Elliptic Curves in Cryptography," Proc. Advances in Cryptology - CRYPTO'85, Lecture Notes in Computer Science, Springer-Verlag, vol. 218, 1986, pp. 417-26.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
69
-
-
20344381294
-
A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
-
D. J. Malan, M. Welsh, and M. D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," Proc. 1st IEEE Int'l. Conf. Sensor and Ad Hoc Commun. and Networks (SECON'04), Santa Clara, CA, Oct. 2004.
-
Proc. 1st IEEE Int'l. Conf. Sensor and Ad Hoc Commun. And Networks (SECON'04), Santa Clara, CA, Oct. 2004
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
70
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Proc. 6th Int'l. Wksp. Cryptographic Hardware and Embedded Systems (CHES'04), Springer-Verlag
-
N. Gura et al., "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Proc. 6th Int'l. Wksp. Cryptographic Hardware and Embedded Systems (CHES'04), Lecture Notes in Computer Science, Springer-Verlag, vol. 3156/2004, 2004, pp. 119-32.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, Issue.2004
, pp. 119-132
-
-
Gura, N.1
-
72
-
-
33750012404
-
Access control in wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
-
Y. Zhou, Y. Zhang, and Y. Fang, "Access Control in Wireless Sensor Networks," Elsevier Ad Hoc Networks Journal, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, 2007, pp. 3-13. (Pubitemid 44573007)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
-
73
-
-
84976770858
-
Responses to NIST's Proposal
-
July
-
S. Vanstone, "Responses to NIST's Proposal," Commun. ACM, vol. 35, July 1992, pp. 50-52.
-
(1992)
Commun. ACM
, vol.35
, pp. 50-52
-
-
Vanstone, S.1
-
74
-
-
29844457287
-
An Efficient Scheme for Authenticating Public Keys in Sensor Networks
-
W. Du, R. Wang, and P. Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks," Proc. 6th ACM Int'l. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc'05), Urbana-Champaign, IL, May 2005.
-
Proc. 6th ACM Int'l. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc'05), Urbana-Champaign, IL, May 2005
-
-
Du, W.1
Wang, R.2
Ning, P.3
-
76
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Advances in Cryptology - CRYPTO'01, Lecture Notes in Computer Science, Springer-Verlag, vol. 2139, 2001, pp. 213-29. (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
78
-
-
33144476837
-
Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
-
special issue on Security in Wireless Ad Hoc Networks, Feb.
-
Y. Zhang et al., "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE JSAC, special issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, Feb. 2006, pp. 247-60.
-
(2006)
IEEE JSAC
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
-
81
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
DOI 10.1109/TDSC.2005.37
-
H. Chan et al., "On the Distribution and Revocation of Cryptographic Keys in Sensor Networks," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, July-Sept. 2005, pp. 233-47. (Pubitemid 41560433)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
82
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Proc. Advances in Cryptology Crypto' 96, Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," Proc. Advances in Cryptology Crypto' 96, Lecture Notes in Computer Science, Springer-Verlag, vol. 1109, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
84
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
Chris Karlof, Naveen Sastry, and David Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. 2nd Int'l. Conf. Embedded Networked Sensor Systems (SenSys'04), Baltimore, MD, Nov. 2004.
-
Proc. 2nd Int'l. Conf. Embedded Networked Sensor Systems (SenSys'04), Baltimore, MD, Nov. 2004
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
86
-
-
4444237581
-
SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks
-
W. Lou, W. Liu, and Y. Fang, "SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks," Proc. 23rd Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM' 04), Hong Kong, Mar 2004.
-
Proc. 23rd Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM' 04), Hong Kong, Mar 2004
-
-
Lou, W.1
Liu, W.2
Fang, Y.3
-
87
-
-
0018545449
-
How to Share a Secret
-
Nov.
-
A. Shamir, "How to Share a Secret," Commun. ACM, vol. 22, no. 11, Nov. 1979, pp. 612-13.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
88
-
-
1542317846
-
An Authentication Framework for Hierarchical Ad Hoc Sensor Networks
-
M. Bohge and W. Trappe, "An Authentication Framework for Hierarchical Ad Hoc Sensor Networks," Proc. 2nd ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, 2003.
-
Proc. 2nd ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, 2003
-
-
Bohge, M.1
Trappe, W.2
-
90
-
-
4544340566
-
Security Support for In-Network Processing in Wireless Sensor Networks
-
J. Deng, R. Han, and S. Mishra, "Security Support for In-Network Processing in Wireless Sensor Networks," Proc. 2003 ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'03), Fairfax, VA, Oct. 2003.
-
Proc. 2003 ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'03), Fairfax, VA, Oct. 2003
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
91
-
-
85180532806
-
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks
-
D. Liu and P. Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks," Proc. 10th Annual Network and Distributed System Security Symp. (NDSS'03), San Diego, CA, Feb. 2003.
-
Proc. 10th Annual Network and Distributed System Security Symp. (NDSS'03), San Diego, CA, Feb. 2003
-
-
Liu, D.1
Ning, P.2
-
92
-
-
84880500084
-
Time Synchronization Attacks in Sensor Networks
-
M. Manzo, T. Roosta, and S. Sastry, "Time Synchronization Attacks in Sensor Networks," Proc. 3rd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'05), Alexandria, VA, Nov. 2005.
-
Proc. 3rd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'05), Alexandria, VA, Nov. 2005
-
-
Manzo, M.1
Roosta, T.2
Sastry, S.3
-
94
-
-
50949090446
-
BABRA: Batch-Based Broadcast Authentication in Wireless Sensor Networks
-
Y. Zhou and Y. Fang, "BABRA: Batch-Based Broadcast Authentication in Wireless Sensor Networks," Proc. 49th annual IEEE Global Telecommun. Conf. (GLOBECOM'06), San Francisco, CA, Nov. 2006.
-
Proc. 49th Annual IEEE Global Telecommun. Conf. (GLOBECOM'06), San Francisco, CA, Nov. 2006
-
-
Zhou, Y.1
Fang, Y.2
-
95
-
-
84880451950
-
On Broadcast Authentication in Wireless Sensor Networks
-
K. Ren et al., "On Broadcast Authentication in Wireless Sensor Networks," Proc. Int'l. Conf. Wireless Algorithms, Systems, and Applications (WASA'06), Xi'an, China, Aug. 2006.
-
Proc. Int'l. Conf. Wireless Algorithms, Systems, and Applications (WASA'06), Xi'an, China, Aug. 2006
-
-
Ren, K.1
-
97
-
-
34247325635
-
An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks
-
S-M Chang et al., "An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks," Proc. 2006 ACM Symp. Information, Computer and Communications Security (ASIACCS' 06), Taipei, Taiwan, Mar. 2006.
-
Proc. 2006 ACM Symp. Information, Computer and Communications Security (ASIACCS' 06), Taipei, Taiwan, Mar. 2006
-
-
Chang, S.-M.1
-
98
-
-
0345565893
-
A Survey of Key Management for Secure Group Communication
-
Sept.
-
S. Rafaeli and D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol. 35, no. 3, Sept. 2003, pp. 309-29.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
99
-
-
11144277843
-
Routing Techniques in Wireless Sensor Networks: A Survey
-
Dec.
-
J. A. Al-Karaki and A. E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey," IEEE Wireless Commun., vol. 11, no. 6, Dec. 2004.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.6
-
-
Al-Karaki, J.A.1
Kamal, A.E.2
-
100
-
-
0034539015
-
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks
-
C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks," Proc. 6th Annual ACM Int'l. Conf. Mobile Computing and Networking (MobiCom'00), Boston, MA, Aug. 2000.
-
Proc. 6th Annual ACM Int'l. Conf. Mobile Computing and Networking (MobiCom'00), Boston, MA, Aug. 2000
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
102
-
-
0003405130
-
Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks
-
UCLA-CSD TR-010023, May
-
Y. Yu, D. Estrin, and R. Govindan, "Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks," UCLA Comp. Sci. Dept. Tech. Rep., UCLA-CSD TR-010023, May 2001.
-
(2001)
UCLA Comp. Sci. Dept. Tech. Rep.
-
-
Yu, Y.1
Estrin, D.2
Govindan, R.3
-
105
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
-
Y. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (INFOCOM'03), San Francisco, CA, Mar. 2003.
-
Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (INFOCOM'03), San Francisco, CA, Mar. 2003
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
106
-
-
1542317831
-
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
-
Y. Hu, A. Perrig, and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proc. 2003 ACM Wksp. Wireless Security (WiSe'03), San Diego, CA, Sept. 2003.
-
Proc. 2003 ACM Wksp. Wireless Security (WiSe'03), San Diego, CA, Sept. 2003
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
107
-
-
0013138682
-
Secure Routing for Mobile Ad Hoc Networks
-
P. Papadimitrators and Z. Haas, "Secure Routing for Mobile Ad Hoc Networks," Proc. SCS Commun. Networks and Distributed System Modeling and Simulation Conf. (CNDS'02), San Antonio, TX, Jan. 2002.
-
Proc. SCS Commun. Networks and Distributed System Modeling and Simulation Conf. (CNDS'02), San Antonio, TX, Jan. 2002
-
-
Papadimitrators, P.1
Haas, Z.2
-
108
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. 8th Annual ACM Int'l. Conf. Mobile Computing and Networking (Mobicom'02), Atlanta, GA, Sept. 2002.
-
Proc. 8th Annual ACM Int'l. Conf. Mobile Computing and Networking (Mobicom'02), Atlanta, GA, Sept. 2002
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
109
-
-
0036980294
-
Securing Ad Hoc Routing Protocols
-
M. Zapata and N. Asokan, "Securing Ad Hoc Routing Protocols," Proc. 3rd ACM Wksp. Wireless Security (WiSe'02), Atlanta, GA, Sep. 2002.
-
Proc. 3rd ACM Wksp. Wireless Security (WiSe'02), Atlanta, GA, Sep. 2002
-
-
Zapata, M.1
Asokan, N.2
-
110
-
-
84961572484
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y. Hu, D. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. 4th IEEE Wksp. Mobile Computing Systems and Applications (WMCSA'02), Callicoon, NY, June 2002.
-
Proc. 4th IEEE Wksp. Mobile Computing Systems and Applications (WMCSA'02), Callicoon, NY, June 2002
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
113
-
-
1842815887
-
Security in Mobile Ad Hoc Networks: Challenges and Solutions
-
Feb.
-
H. Yang et al., "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Commun., vol. 11, no. 1, Feb. 2004, pp. 38-47.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
-
114
-
-
84880451368
-
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
-
J. Deng, R. Han, and S. Mishra, "A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks," Proc. 2nd IEEE Int'l. Wksp. Info. Processing in Sensor Networks (IPSN'03), Palo Alto, CA, Apr. 2003.
-
Proc. 2nd IEEE Int'l. Wksp. Info. Processing in Sensor Networks (IPSN'03), Palo Alto, CA, Apr. 2003
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
116
-
-
14344254253
-
A Secure Hierarchical Model for Sensor Networks
-
Mar.
-
M. Tubaishat et al., "A Secure Hierarchical Model for Sensor Networks," ACM SIGMOD Record, vol. 33, no. 1, Mar. 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
-
-
Tubaishat, M.1
-
117
-
-
0007700726
-
Tamper Resistance - A Cautionary Note
-
Ross Anderson and Markus Kuhn, "Tamper Resistance - A Cautionary Note," Proc. 2nd USENIX Wksp. Electronic Commerce, Oakland, CA, Nov. 1996.
-
Proc. 2nd USENIX Wksp. Electronic Commerce, Oakland, CA, Nov. 1996
-
-
Anderson, R.1
Kuhn, M.2
-
118
-
-
27544460282
-
Distributed Detection of Node Replication Attacks in Sensor Networks
-
B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. 2005 IEEE Symp. Security and Privacy (SP'05), Oakland, CA, May 2005.
-
Proc. 2005 IEEE Symp. Security and Privacy (SP'05), Oakland, CA, May 2005
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
120
-
-
84977898401
-
Using Directional Antennas to Prevent Wormhole Attacks
-
L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," Proc. 11th Annual Network and Distributed System Security Symp. (NDSS'04), San Diego, CA, Feb. 2004.
-
Proc. 11th Annual Network and Distributed System Security Symp. (NDSS'04), San Diego, CA, Feb. 2004
-
-
Hu, L.1
Evans, D.2
-
121
-
-
11244309139
-
Visualization of Wormholes in Sensor Networks
-
W. Wang and B. Bhargava, "Visualization of Wormholes in Sensor Networks," Proc. 2004 ACM Wksp. Wireless Security (Wise'04), Philadelphia, PA, Oct. 2004.
-
Proc. 2004 ACM Wksp. Wireless Security (Wise'04), Philadelphia, PA, Oct. 2004
-
-
Wang, W.1
Bhargava, B.2
-
122
-
-
33847326821
-
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks
-
I. Khalil, S. Bagchi, and C. Nita-Rotaru, " DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks," Proc. 1st IEEE Int'l. Conf. Security and Privacy for Emerging Areas in Commun. Networks (SecureComm'05), Sep. 2005.
-
Proc. 1st IEEE Int'l. Conf. Security and Privacy for Emerging Areas in Commun. Networks (SecureComm'05), Sep. 2005
-
-
Khalil, I.1
Bagchi, S.2
Nita-Rotaru, C.3
-
123
-
-
14844315770
-
Reputation-Based Framework for High Integrity Sensor Networks
-
S. Ganeriwal and M. Srivastava, "Reputation-Based Framework for High Integrity Sensor Networks," Proc. 2nd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'04), Washington, DC, Oct. 2004.
-
Proc. 2nd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'04), Washington, DC, Oct. 2004
-
-
Ganeriwal, S.1
Srivastava, M.2
-
128
-
-
11244252132
-
Denial of Service Resilience in Ad Hoc Networks
-
I. Aad, J. Hubaux, and E. Knightly, "Denial of Service Resilience in Ad Hoc Networks," Proc. 10th Annual ACM Int'l. Conf. Mobile Computing and Networking (MobiCom'04), Philadelphia, PA, Sept. 2004.
-
Proc. 10th Annual ACM Int'l. Conf. Mobile Computing and Networking (MobiCom'04), Philadelphia, PA, Sept. 2004
-
-
Aad, I.1
Hubaux, J.2
Knightly, E.3
-
130
-
-
33745969132
-
Defending against Path-Based DoS Attacks in Wireless Sensor Networks
-
J. Deng, R. Han, and S. Mishra, "Defending against Path-Based DoS Attacks in Wireless Sensor Networks," Proc. 3rd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'05), Alexandria, VA, Nov. 2005.
-
Proc. 3rd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'05), Alexandria, VA, Nov. 2005
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
131
-
-
30344445246
-
-
Technical Report CU-CS-951-03, Department of Computer Science, Univ. of Colorado, Apr.
-
J. Deng, R. Han, and S. Mishra, "Enhancing Base Station Security in Wireless Sensor Networks," Technical Report CU-CS-951-03, Department of Computer Science, Univ. of Colorado, Apr. 2003.
-
(2003)
Enhancing Base Station Security in Wireless Sensor Networks
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
134
-
-
0037253062
-
The Vision of Autonomic Computing
-
Jan.
-
J. O. Kephart and D. M. Chess, "The Vision of Autonomic Computing," IEEE Computer Mag., vol. 36, no. 1, Jan. 2003, pp. 41-50.
-
(2003)
IEEE Computer Mag.
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart, J.O.1
Chess, D.M.2
-
136
-
-
26444539711
-
Performance Management for Cluster-Based Web Services
-
G. Pacifici, "Performance Management for Cluster-Based Web Services," IBM Technical Report, 2003.
-
(2003)
IBM Technical Report
-
-
Pacifici, G.1
-
138
-
-
18844457825
-
SIA: Secure Information Aggregation in Sensor Networks
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," Proc. 1st ACM Int'l. Conf. Embedded Networked Sensor Systems (SenSys'03), Los Angeles, CA, Nov. 2003.
-
Proc. 1st ACM Int'l. Conf. Embedded Networked Sensor Systems (SenSys'03), Los Angeles, CA, Nov. 2003
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
141
-
-
25844473466
-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collabo-ration- Based Approach
-
W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collabo-ration- Based Approach," Proc. 24th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'05), Miami, FL, Mar. 2005.
-
Proc. 24th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'05), Miami, FL, Mar. 2005
-
-
Zhang, W.1
Cao, G.2
-
143
-
-
36248933437
-
LEDS: Providing Location- Aware End-to-End Data Security in Wireless Sensor Networks
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location- Aware End-to-End Data Security in Wireless Sensor Networks," Proc. 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006.
-
Proc. 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
144
-
-
38549177436
-
A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks
-
Z. Yu and Y. Guan, "A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks," Proc. 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006.
-
Proc. 25th Annual IEEE Joint Conf. IEEE Computer and Commun. Societies (INFOCOM'06), Barcelona, Spain, Apr. 2006
-
-
Yu, Z.1
Guan, Y.2
-
147
-
-
1542295442
-
The Impact of Data Aggregation in Wireless Sensor Networks
-
B. Krishnamachari, D. Estrin, and S. Wicker, "The Impact of Data Aggregation in Wireless Sensor Networks," Proc. 2002 Int'l. Wksp. Distributed Event-Based Systems, (DEBS'02), Vienna, Austria, July 2002.
-
Proc. 2002 Int'l. Wksp. Distributed Event-Based Systems, (DEBS'02), Vienna, Austria, July 2002
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.3
-
149
-
-
33749525209
-
Efficient Aggregation of Encrypted Data in Wireless Sensor Networks
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. 2nd Annual Int'l. Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05), San Diego, CA, July 2005.
-
Proc. 2nd Annual Int'l. Conf. Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'05), San Diego, CA, July 2005
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
150
-
-
33744923423
-
Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis
-
J-Y. Chen, G. Pandurangan, and D. Xu, "Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis," Proc. 4th Int'l. Symp. Information Processing in Sensor Networks (IPSN'05), Los Angeles, CA, Apr. 2005.
-
Proc. 4th Int'l. Symp. Information Processing in Sensor Networks (IPSN'05), Los Angeles, CA, Apr. 2005
-
-
Chen, J.-Y.1
Pandurangan, G.2
Xu, D.3
-
151
-
-
33748089962
-
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
-
Y. Yang, X. Wang, and S. Zhu, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," Proc. 7th ACM Int'l. Symp. Mobile Ad Hoc Networking and Computing (Mobihoc'06), Florence, Italy, May 2006.
-
Proc. 7th ACM Int'l. Symp. Mobile Ad Hoc Networking and Computing (Mobihoc'06), Florence, Italy, May 2006
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
-
153
-
-
1542317849
-
Secure Verification of Location Claims
-
N. Sastry, U. Shankar, and D. Wagner, "Secure Verification of Location Claims," Proc. 2003 ACM Wksp. Wireless Security (WiSe'03), San Diego, CA, Sept. 2003.
-
Proc. 2003 ACM Wksp. Wireless Security (WiSe'03), San Diego, CA, Sept. 2003
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
154
-
-
11244264140
-
SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks
-
L. Lazos and R. Poovendran, "SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks," Proc. 2004 ACM Wksp. Wireless Security (WiSe'04), Philadelphia, PA, Oct. 2004.
-
Proc. 2004 ACM Wksp. Wireless Security (WiSe'04), Philadelphia, PA, Oct. 2004
-
-
Lazos, L.1
Poovendran, R.2
-
155
-
-
25844439422
-
Secure Positioning of Wireless Devices with Application to Sensor Networks
-
S. Capkun and J-P. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," Proc. 24th Annual IEEE Joint Conf. IEEE Computer and Communications Societies (INFOCOM'05), Miami, FL, Mar. 2005.
-
Proc. 24th Annual IEEE Joint Conf. IEEE Computer and Communications Societies (INFOCOM'05), Miami, FL, Mar. 2005
-
-
Capkun, S.1
Hubaux, J.-P.2
-
156
-
-
33847411513
-
Secure Localization in Wireless Sensor Networks
-
Y. Zhang, W. Liu, and Y. Fang, "Secure Localization in Wireless Sensor Networks," Proc. 2005 IEEE Military Commun. Conf. (MILCOM'05), Atlantic City, NJ, Oct. 2005.
-
Proc. 2005 IEEE Military Commun. Conf. (MILCOM'05), Atlantic City, NJ, Oct. 2005
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
-
157
-
-
33947309703
-
Secure Localization and Authentication in Ultra-Wideband Sensor Networks
-
Special Issue on UWB Wireless Communications - Theory and Applications, Apr.
-
Y. Zhang et al., "Secure Localization and Authentication in Ultra-Wideband Sensor Networks," IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications, vol. 24, no. 4, Apr. 2006, pp. 829-35.
-
(2006)
IEEE JSAC
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
-
158
-
-
14844303406
-
Source-Location Privacy in Energy-Constrained Sensor Network Routing
-
C. Ozturk, Y. Zhang, and W. Trappe, "Source-Location Privacy in Energy-Constrained Sensor Network Routing," Proc. 2nd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'04), Washington, DC, Oct. 2004.
-
Proc. 2nd ACM Wksp. Security of Ad Hoc and Sensor Networks (SASN'04), Washington, DC, Oct. 2004
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
160
-
-
0242665588
-
Real-Time Watermarking Techniques for Sensor Networks
-
Santa Clara, CA, Jan.
-
J. Feng and M. Potkonjak, "Real-Time Watermarking Techniques for Sensor Networks," ES&T/SPIE, Security and Watermarking of Multimedia Contents, Santa Clara, CA, Jan. 2003.
-
(2003)
ES&T/SPIE, Security and Watermarking of Multimedia Contents
-
-
Feng, J.1
Potkonjak, M.2
|