-
2
-
-
84872155956
-
-
"Sensor Node," http://en.wikipedia.org/wiki/Sensor-node.
-
Sensor Node
-
-
-
3
-
-
37849004592
-
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
-
September
-
M. Conti, R. D. Pietro, and L. V. Mancini, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," In Proc. of ACM MobiHoc, September 2007.
-
(2007)
Proc. of ACM MobiHoc
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
-
4
-
-
8344261381
-
Rigidity, Computation, and Randomization of Network Localization
-
March
-
T. Eren, D. Goldenberg, W. Whitley, Y. Yang, S. Morse, B. Anderson, and P. Belhumeur, "Rigidity, Computation, and Randomization of Network Localization." In Proc. of IEEE INFOCOM, March 2004.
-
(2004)
Proc. of IEEE INFOCOM
-
-
Eren, T.1
Goldenberg, D.2
Whitley, W.3
Yang, Y.4
Morse, S.5
Anderson, B.6
Belhumeur, P.7
-
5
-
-
25844435734
-
Network Localization in Partially Localizable Networks
-
March
-
D. Goldenberg, A. Krishnamurthy, W. Maness, Y. R. Yang, A. Young, A. S. Morse, A. Savvides, and B. Anderson, "Network Localization in Partially Localizable Networks," In Proc. of IEEE INFOCOM, March 2005.
-
(2005)
Proc. of IEEE INFOCOM
-
-
Goldenberg, D.1
Krishnamurthy, A.2
Maness, W.3
Yang, Y.R.4
Young, A.5
Morse, A.S.6
Savvides, A.7
Anderson, B.8
-
6
-
-
84996787881
-
Routing with Guaranteed Delivery in Ad Hoc Wireless Networks
-
August
-
P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, "Routing with Guaranteed Delivery in Ad Hoc Wireless Networks," In Proc. of International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM), August 1999.
-
(1999)
Proc. of International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DialM)
-
-
Bose, P.1
Morin, P.2
Stojmenovic, I.3
Urrutia, J.4
-
7
-
-
0034547115
-
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
-
August
-
B. Karp and H. T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," In Proc. of ACM MobiCom, August 2000.
-
(2000)
Proc. of ACM MobiCom
-
-
Karp, B.1
Kung, H.T.2
-
8
-
-
0012970453
-
Identity-Based Encryption from the Weil Pairing
-
August
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," In Proc. of CRYPTO, August 2001.
-
(2001)
Proc. of CRYPTO
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
0842304788
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
August
-
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," In Proc. of CRYPTO, August 2002.
-
(2002)
Proc. of CRYPTO
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
11
-
-
0001827537
-
Identity-Based Cryptosystems and Signature Schemes
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," In Proc. of CRYPTO, 1985.
-
(1985)
Proc. of CRYPTO
-
-
Shamir, A.1
-
12
-
-
48649109631
-
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
-
December
-
B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy, "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks," Annual Computer Security Applications Conference (ACSAC), December 2007.
-
(2007)
Annual Computer Security Applications Conference (ACSAC)
-
-
Zhu, B.1
Addada, V.G.K.2
Setia, S.3
Jajodia, S.4
Roy, S.5
-
14
-
-
0003508562
-
Digital Signature Standard
-
March
-
"Digital Signature Standard," FIPS PUB 186-3, March 2006.
-
(2006)
FIPS PUB 186-3
-
-
-
15
-
-
37849052004
-
Balancing Traffic Load in Wireless Networks with Curveball Routing
-
September
-
L. Popa, A. Rostamizadeh, R. Karp, C. Papadimitriou, and I. Stoica, "Balancing Traffic Load in Wireless Networks with Curveball Routing," In Proc. of ACM MobiHoc, September 2007.
-
(2007)
Proc. of ACM MobiHoc
-
-
Popa, L.1
Rostamizadeh, A.2
Karp, R.3
Papadimitriou, C.4
Stoica, I.5
-
16
-
-
33646581008
-
Energy Analysis of Public-key Cryptography for Wireless Sensor Networks
-
March
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy Analysis of Public-key Cryptography for Wireless Sensor Networks," In Proc. of Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM), March 2005.
-
(2005)
Proc. of Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM)
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
17
-
-
51849154670
-
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
-
June
-
K. Xing, F. Liu, X. Cheng, and D. H. C. Du, "Real-Time Detection of Clone Attacks in Wireless Sensor Networks," The International Conference on Distributed Computing Systems (ICDCS), June 2008.
-
(2008)
The International Conference on Distributed Computing Systems (ICDCS)
-
-
Xing, K.1
Liu, F.2
Cheng, X.3
Du, D.H.C.4
-
18
-
-
51749098253
-
Mobile Sensor Network Resilient Against Node Replication Attacks
-
June
-
C. M. Yu, C. S. Lu, and S. Y. Kuo, "Mobile Sensor Network Resilient Against Node Replication Attacks," In Proc. of IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), June 2008.
-
(2008)
Proc. of IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
-
-
Yu, C.M.1
Lu, C.S.2
Kuo, S.Y.3
-
20
-
-
36249025569
-
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
-
November
-
R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir, "On the Detection of Clones in Sensor Networks Using Random Key Predistribution," IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, vol. 37, no. 6, pp. 1246-1258, November 2007.
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
21
-
-
0014814325
-
Space/Time Trade-Offs in Hash Coding with Allowable Errors
-
July
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, July 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
22
-
-
33644905483
-
Network Applications of Bloom Filters: A Survey
-
June
-
A. Broder and M. Mitzenmacher, "Network Applications of Bloom Filters: a Survey," Internet Mathematics, vol. 1, no. 4, pp. 636-646, June 2002.
-
(2002)
Internet Mathematics
, vol.1
, Issue.4
, pp. 636-646
-
-
Broder, A.1
Mitzenmacher, M.2
|