-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," Computer Networks, vol.38, no.4, pp.393-422, March 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
0035789268
-
Highly-resilient, energy-efficient multipath routing in wireless sensor networks, ACM
-
October
-
D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly- resilient, energy-efficient multipath routing in wireless sensor networks," ACM SIGMOBILE Mobile Computing and Communications Review, vol.5, no.4, pp. 11-25, October 2001.
-
(2001)
SIGMOBILE Mobile Computing and Communications Review
, vol.5
, Issue.4
, pp. 11-25
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
4
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
New York, NY, USA: ACM
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems. New York, NY, USA: ACM, 2004, pp. 162-175.
-
(2004)
SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
5
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
New York, NY, USA: ACM
-
L. Eschenauer and V D. Gligor, "A key-management scheme for distributed sensor networks," in CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2002, pp. 41-47.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
6
-
-
4143052629
-
Probabilistic distributed key pre-distribution for mobile ad hoc networks
-
Paris, France, June
-
A. C. Chan, "Probabilistic distributed key pre-distribution for mobile ad hoc networks," in Proceedings of IEEE International Conference on Commununications (ICC 2004), vol.6, Paris, France, June 2004, pp. 3743-3747.
-
(2004)
Proceedings of IEEE International Conference on Commununications (ICC 2004)
, vol.6
, pp. 3743-3747
-
-
Chan, A.C.1
-
7
-
-
0038487088
-
"Random key predistribution schemes for sensor networks
-
Oakland, California, USA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, USA, May 2003, pp. 197-213.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM transactions on information and system security, vol.8, no.1, pp. 41-77, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
9
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
New York, NY, USA: ACM
-
W. Du, J. Deng, Y S. Han, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2003, pp. 42-51.
-
(2003)
CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
10
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
[10] W. Du, J. Deng, Y S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM transactions on information and system security, vol.8, no.2, pp. 228-258, 2005. (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
11
-
-
34547404724
-
Diversify sensor nodes to improve resilience against node compromise
-
New York, NY, USA: ACM
-
A. Alarifi and W. Du, "Diversify sensor nodes to improve resilience against node compromise," in SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2006, pp. 101-112.
-
(2006)
SASN '06: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 101-112
-
-
Alarifi, A.1
Du, W.2
-
12
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
New York, NY, USA: ACM
-
C. Linn and S. Debray, "Obfuscation of executable code to improve resistance to static disassembly," in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2003, pp. 290-299.
-
(2003)
CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 290-299
-
-
Linn, C.1
Debray, S.2
-
13
-
-
77949736741
-
Mica, the commercialization of microsensor motes
-
April
-
M. Horton, D. Culler, K. Pister, J. Hill, R. Szewczyk, and A. Woo, "Mica, the commercialization of microsensor motes," Sensors, vol.19, no.4, pp. 40-48, April 2002.
-
(2002)
Sensors
, vol.19
, Issue.4
, pp. 40-48
-
-
Horton, M.1
Culler, D.2
Pister, K.3
Hill, J.4
Szewczyk, R.5
Woo, A.6
-
14
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors," ACM SIGPLAN Notices, vol.35, no.11, pp. 93-104, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
15
-
-
18844399081
-
Tossim: Accurate and scalable simulation of entire tinyos applications
-
New York, NY, USA: ACM
-
P. Levis, N. Lee, M. Welsh, and D. Culler, "Tossim: accurate and scalable simulation of entire tinyos applications," in SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems. New York, NY, USA: ACM, 2003, pp. 126-137.
-
(2003)
SenSys '03: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
16
-
-
70449648603
-
Security in wireless sensor networks: A survey
-
Y Xiao, Ed. Auerbach Publications
-
W. Zhang, S. K. Das, and Y Liu, "Security in wireless sensor networks: A survey," in Security in Sensor Networks, Y Xiao, Ed. Auerbach Publications, 2007, pp. 237-272.
-
(2007)
Security in Sensor Networks
, pp. 237-272
-
-
Zhang, W.1
Das, S.K.2
Liu, Y.3
-
18
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commununications of the ACM, vol.22, no.11, pp. 612-613, 1979.
-
(1979)
Commununications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
85062838317
-
Safeguarding cryptographic keys
-
Arlington, Virginia, USA, September
-
G. R. Blakley, "Safeguarding cryptographic keys," in Proceedings of American Federation of Information Processing Societies National Computer Conference, vol.48, Arlington, Virginia, USA, September 1979, pp. 313-317.
-
(1979)
Proceedings of American Federation of Information Processing Societies National Computer Conference
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
|