-
1
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
2
-
-
34547322775
-
An application-driven perspective on wireless sensor network security
-
New York, NY, USA: ACM Press
-
E. Sabbah, A. Majeed, K.-D. Kang, K. Liu, and N. Abu-Ghazaleh, "An application-driven perspective on wireless sensor network security," in Q2SWinet '06: Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks. New York, NY, USA: ACM Press, 2006, pp. 1-8.
-
(2006)
Q2SWinet '06: Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
, pp. 1-8
-
-
Sabbah, E.1
Majeed, A.2
Kang, K.-D.3
Liu, K.4
Abu-Ghazaleh, N.5
-
3
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
A. Back, U. Møller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Proceedings of the 4th Information Hiding Internation Workshop(IHW'01), 2001, pp. 245-257.
-
(2001)
Proceedings of the 4th Information Hiding Internation Workshop(IHW'01)
, pp. 245-257
-
-
Back, A.1
Møller, U.2
Stiglic, A.3
-
4
-
-
72849135065
-
-
R. E. Newman, I. S. Moskowitz, P. Syverson, and A. Serjantov, Metrics for traffic analysis prevention, in Privacy Enhancing Technologies, 2004, pp. 48-65, workshop, PET 2004, Revised Selected Papers.
-
R. E. Newman, I. S. Moskowitz, P. Syverson, and A. Serjantov, "Metrics for traffic analysis prevention," in Privacy Enhancing Technologies, 2004, pp. 48-65, workshop, PET 2004, Revised Selected Papers.
-
-
-
-
5
-
-
33847350601
-
Effective Probabilistic Approach Protecting Sensor Traffic
-
X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, "Effective Probabilistic Approach Protecting Sensor Traffic," in Proceedings of the IEEE Military Communications Conference (MILCOM'05), 2005, pp. 1-7.
-
(2005)
Proceedings of the IEEE Military Communications Conference (MILCOM'05)
, pp. 1-7
-
-
Hong, X.1
Wang, P.2
Kong, J.3
Zheng, Q.4
Liu, J.5
-
6
-
-
0242696170
-
Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
New York, NY, USA: ACM Press
-
J. Kong and X. Hong, "Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks," in MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM Press, 2003, pp. 291-302.
-
(2003)
MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
10
-
-
0035727921
-
A dynamic mix method for wireless ad hoc networks
-
S. Jiang, N. Vaidya, and W. Zhao, "A dynamic mix method for wireless ad hoc networks," in Proceedings of the IEEE Military Communications Conference (MILCOM'01), vol. 2, 2001.
-
(2001)
Proceedings of the IEEE Military Communications Conference (MILCOM'01)
, vol.2
-
-
Jiang, S.1
Vaidya, N.2
Zhao, W.3
-
11
-
-
27944485356
-
On Flow Marking Attacks in Wireless Anonymous Communication Networks
-
X. Fu, Y. Zhu, B. Graham, R. Bettati, W. Zhao, and A. Texas, "On Flow Marking Attacks in Wireless Anonymous Communication Networks," in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005, pp. 493-503.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)
, pp. 493-503
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
Texas, A.6
-
12
-
-
72849129460
-
Using Parasite Flows to Camouflage Flow Traffic
-
X. Fu, Y. Guan, B. Graham, R. Bettati, and W. Zhao, "Using Parasite Flows to Camouflage Flow Traffic," in Proceedings of 3rd Annual IEEE Information Assurance Workshop 2002, 2002.
-
(2002)
Proceedings of 3rd Annual IEEE Information Assurance Workshop 2002
-
-
Fu, X.1
Guan, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
13
-
-
27944449345
-
Enhancing Source-Location Privacy in Sensor Network Routing
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing Source-Location Privacy in Sensor Network Routing," in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005, pp. 599-608.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
14
-
-
84964545607
-
Preventing traffic analysis in packet radio networks
-
S. Jiang, N. Vaidya, and W. Zhao, "Preventing traffic analysis in packet radio networks," in Proceedings of DARPA Information Survivability Conference & Exposition II (DISCEX'01), vol. 2, 2001.
-
(2001)
Proceedings of DARPA Information Survivability Conference & Exposition II (DISCEX'01)
, vol.2
-
-
Jiang, S.1
Vaidya, N.2
Zhao, W.3
-
15
-
-
27544481638
-
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing
-
J. Kong, X. Hong, M. Sanadidi, and M. Gerla, "Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing," in Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC'05), 2005, pp. 57-62.
-
(2005)
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC'05)
, pp. 57-62
-
-
Kong, J.1
Hong, X.2
Sanadidi, M.3
Gerla, M.4
-
17
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
IEEE Computer Society
-
J. Deng, R. Han, and S. Mishra, "Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks," in DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04). IEEE Computer Society, 2004, p. 637.
-
(2004)
DSN '04: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04)
, pp. 637
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
18
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
-, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks," Pervasive and Mobile Computing, vol. 2, no. 2, pp. 159-186, 2006.
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
|