-
1
-
-
2442519150
-
Location- centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks
-
S. Tanachaiwiwat, P. Dave , R. Bhindwale, A. Helmy, "Location- centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks," International Conference On Performance, Computing and Communications, 2004, pp: 463-469.
-
(2004)
International Conference On Performance, Computing and Communications
, pp. 463-469
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
3
-
-
36049014460
-
Secure and energy aware routing against wormholes and sinkholes in wireless sensor networks
-
H. Al Nahas, J. Deogun, E Manley, "Secure and energy aware routing against wormholes and sinkholes in wireless sensor networks," First International Conference on Communications and Networking, 2006, pp: 1-8.
-
(2006)
First International Conference on Communications and Networking
, pp. 1-8
-
-
Al Nahas, H.1
Deogun, J.2
Manley, E.3
-
4
-
-
33846592361
-
A security protocol for sensor networks
-
K. Stewart, T.Haniotakis, "A security protocol for sensor networks," Global Telecommunications Conference, vol. 3, 2005, pp: 5.
-
(2005)
Global Telecommunications Conference
, vol.3
, pp. 5
-
-
Stewart, K.1
Haniotakis, T.2
-
7
-
-
70449702519
-
Detecting selective forwarding attacks in wireless sensor networks
-
B. Yu, B. Xiao, "Detecting selective forwarding attacks in wireless sensor networks," Journal of Parallel and Distributed Computing, vol. 67, 2006, pp: 1218-1230.
-
(2006)
Journal of Parallel and Distributed Computing
, vol.67
, pp. 1218-1230
-
-
Yu, B.1
Xiao, B.2
-
10
-
-
34547266421
-
An energy efficient multipath routing protocol for wireless sensor networks
-
Y. Lu, V.Wong, An energy efficient multipath routing protocol for wireless sensor networks. International Journal of Communication Systems.2007,pp:747-766
-
(2007)
International Journal of Communication Systems
, pp. 747-766
-
-
Lu, Y.1
Wong, V.2
-
12
-
-
84944414611
-
ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks
-
B. Deb, S. Bhatnagar, and B. Nath, "ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks," IEEE Local Computer Networks, 2003, pp: 406-415.
-
(2003)
IEEE Local Computer Networks
, pp. 406-415
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
14
-
-
33746617289
-
ID Modulation: Embedding Sensor Data in an RFID Timeseries
-
J. Smith, B. Jiang. ID Modulation: Embedding Sensor Data in an RFID Timeseries. 7th Information hiding, 2005, pp: 234-246.
-
(2005)
7th Information hiding
, pp. 234-246
-
-
Smith, J.1
Jiang, B.2
-
15
-
-
33645671682
-
-
R. Sion, M. Atallah, S. Prabhakar.Rights, Protection for Discrete Numeric Streams, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 18, no. 5, 2006, pp: 1-16.
-
R. Sion, M. Atallah, S. Prabhakar.Rights, "Protection for Discrete Numeric Streams," IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, vol. 18, no. 5, 2006, pp: 1-16.
-
-
-
-
17
-
-
0242665588
-
-
J. Feng, M. Potkonjak, Real-time watermarking techniques for sensor networks, Security and Watermarking of Multimedia Contents V, Santa clara CA, 5020, 2003, pp: 391-40J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., 2. Oxford: Clarendon, 1892, pp.68-73.
-
J. Feng, M. Potkonjak, "Real-time watermarking techniques for sensor networks," Security and Watermarking of Multimedia Contents V, Santa clara CA, vol. 5020, 2003, pp: 391-40J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
-
-
-
|