-
1
-
-
84905852894
-
TSAR: A two tier sensor storage architecture using interval skip graphs
-
San Diego, California, USA, Nov.
-
P. Desnoyers, D. Ganesan, and P. Shenoy, "TSAR: A two tier sensor storage architecture using interval skip graphs," in ACM SenSys'05, San Diego, California, USA, Nov. 2005, pp. 39-50.
-
(2005)
ACM SenSys'05
, pp. 39-50
-
-
Desnoyers, P.1
Ganesan, D.2
Shenoy, P.3
-
2
-
-
33748074817
-
Data storage placement in sensor networks
-
Florence, Italy, May
-
B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006, pp. 344-355.
-
(2006)
ACM MobiHoc'06
, pp. 344-355
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
-
3
-
-
34548302064
-
PDCS: Security and privacy support for data-centric sensor networks
-
Anchorage, Alaska, USA, May
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007, pp. 1298-1306.
-
(2007)
IEEE INFOCOM'07
, pp. 1298-1306
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
4
-
-
70349652889
-
Verifiable privacy-preserving range query in sensor networks
-
Phoenix, AZ, Apr.
-
B. Sheng and Q. Li, "Verifiable privacy-preserving range query in sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008, pp. 46-50.
-
(2008)
IEEE INFOCOM'08
, pp. 46-50
-
-
Sheng, B.1
Li, Q.2
-
5
-
-
34547484870
-
The tenet architecture for tiered sensor networks
-
Boulder, Colorado, USA, Oct.
-
O. Gnawali, K.-Y. Jang, J. Paek, M. Vieira, R. Govindan, B. Greenstein, A. Joki, D. Estrin, and E. Kohler, "The tenet architecture for tiered sensor networks," in ACM SenSys'06, Boulder, Colorado, USA, Oct. 2006, pp. 153-166.
-
(2006)
ACM SenSys'06
, pp. 153-166
-
-
Gnawali, O.1
Jang, K.-Y.2
Paek, J.3
Vieira, M.4
Govindan, R.5
Greenstein, B.6
Joki, A.7
Estrin, D.8
Kohler, E.9
-
6
-
-
4243197464
-
Multi-dimensional range queries in sensor networks
-
Los Angeles, California, USA, Nov.
-
X. Li, Y. J. Kim, R. Govindan, and W. Hong, "Multi-dimensional range queries in sensor networks," in ACM SenSys'03, Los Angeles, California, USA, Nov. 2003, pp. 63-75.
-
(2003)
ACM SenSys'03
, pp. 63-75
-
-
Li, X.1
Kim, Y.J.2
Govindan, R.3
Hong, W.4
-
7
-
-
23944487783
-
TinyDB: An acquisitional query processing system for sensor networks
-
Mar.
-
S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: an acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005.
-
(2005)
ACM Trans. Database Syst.
, vol.30
, Issue.1
, pp. 122-173
-
-
Madden, S.R.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
8
-
-
51249105495
-
Rethinking data management for storage-centric sensor networks
-
Asilomar, CA, USA, Jan.
-
Y. Diao, D. Ganesan, G. Mathur, and P. J. Shenoy, "Rethinking data management for storage-centric sensor networks," in CIDR'07, Asilomar, CA, USA, Jan. 2007, pp. 22-31.
-
(2007)
CIDR'07
, pp. 22-31
-
-
Diao, Y.1
Ganesan, D.2
Mathur, G.3
Shenoy, P.J.4
-
9
-
-
70349690087
-
Secure range queries in tiered sensor networks
-
Rio de Janeiro, Brazil, Apr.
-
J. Shi, R. Zhang, and Y. Zhang, "Secure range queries in tiered sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
IEEE INFOCOM'09
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
10
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin
-
H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in ACM SIGMOD'02, Madison, Wisconsin, 6 2002, pp. 216-227.
-
(2002)
ACM SIGMOD'02
, vol.6
, pp. 216-227
-
-
Hacigümüs, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
11
-
-
85065578926
-
A privacy-preserving index for range queries
-
Toronto, Canada, Aug.
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in VLDB'04, Toronto, Canada, Aug. 2004, pp. 720-731.
-
(2004)
VLDB'04
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
12
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
DOI 10.1109/IPSN.2005.1440904, 1440904, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005
-
D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in sensor networks," in IPSN'05, Los Angeles, CA, Apr. 2005, pp. 99-106. (Pubitemid 43841220)
-
(2005)
2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005
, vol.2005
, pp. 99-106
-
-
Liu, D.1
Ning, P.2
Du, W.K.3
-
13
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
DOI 10.1109/JSAC.2005.863855
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Select. Areas Commun., Special Issue on UWB Wireless Communications - Theory and Applications, vol. 24, no. 4, pp. 829-835, Apr. 2006. (Pubitemid 46438080)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
14
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
Urbana-Champaign, IL, USA, May
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
-
(2005)
ACM MobiHoc'05
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
15
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, Nov.
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS'02, Washington, DC, Nov. 2002, pp. 41-47.
-
(2002)
ACM CCS'02
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
16
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE S&P'03, Oakland, CA, May 2003, pp. 197-213.
-
(2003)
IEEE S&P'03
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
17
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Washington, DC, Oct.
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 62-72.
-
(2003)
ACM CCS'03
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
18
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC, Oct.
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 52-61.
-
(2003)
ACM CCS'03
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
19
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
20
-
-
34548205306
-
IPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks
-
Aug.
-
L. Ma, X. Cheng, F. Liu, F. An, and M. Rivera, "iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1174-1184, Aug. 2007.
-
(2007)
IEEE Trans. Parallel Distrib. Syst.
, vol.18
, Issue.8
, pp. 1174-1184
-
-
Ma, L.1
Cheng, X.2
Liu, F.3
An, F.4
Rivera, M.5
-
21
-
-
70349658629
-
DP2AC: Distributed privacy-preserving access control in sensor networks
-
Rio de Janeiro, Brazil, Apr.
-
R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed privacy-preserving access control in sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
IEEE INFOCOM'09
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
22
-
-
70349659577
-
Dependable and secure sensor data storage with dynamic integrity assurance
-
Rio de Janeiro, Brazil, Apr.
-
Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
IEEE INFOCOM'09
-
-
Wang, Q.1
Ren, K.2
Lou, W.3
Zhang, Y.4
-
23
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Aug.
-
P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, Aug. 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
24
-
-
85000276942
-
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multilevel μTESLA: Broadcast authentication for distributed sensor networks," Trans. on Embedded Computing Sys., vol. 3, no. 4, pp. 800-836, 2004.
-
(2004)
Trans. on Embedded Computing Sys.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
26
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
St. Louis, MO, Apr.
-
A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN'08, St. Louis, MO, Apr. 2008, pp. 245-256.
-
(2008)
IPSN'08
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
27
-
-
51849154205
-
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control
-
Beijing, China, Jun.
-
H. Wang, B. Sheng, C. C. Tan, and Q. Li, "Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control," in ICDCS'08, Beijing, China, Jun. 2008, pp. 11-18.
-
(2008)
ICDCS'08
, pp. 11-18
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
|