-
2
-
-
74249096775
-
Adaptive gossip-based broadcast
-
L. Rodrigues, S. Handurukande, J. Pereira, R. Guerraoui, and A. Kermarrec, "Adaptive gossip-based broadcast," in DSN'03.
-
DSN'03
-
-
Rodrigues, L.1
Handurukande, S.2
Pereira, J.3
Guerraoui, R.4
Kermarrec, A.5
-
4
-
-
25844529484
-
Performance comparison of scalable location services for geographic ad hoc routing
-
H. H. Y. Das, S.M. Pucha, "Performance comparison of scalable location services for geographic ad hoc routing," in INFOCOM, 2005.
-
INFOCOM, 2005
-
-
Das, H.H.Y.1
Pucha, S.M.2
-
5
-
-
27544460282
-
-
B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, Proceedings ofIEEE Symposium on Security and Privacy'05, 00, pp. 49-63, 2005.
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," Proceedings ofIEEE Symposium on Security and Privacy'05, vol. 00, pp. 49-63, 2005.
-
-
-
-
7
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
IEEE Computer Society
-
A. Perrig, J. D. Tygar, D. Song, and R. Canetti, "Efficient authentication and signing of multicast streams over lossy channels," in Proceedings of IEEE Symposium on Security and Privacy '00. IEEE Computer Society, 2000, p. 56.
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy '00
, pp. 56
-
-
Perrig, A.1
Tygar, J.D.2
Song, D.3
Canetti, R.4
-
8
-
-
10044284351
-
Leap: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap: efficient security mechanisms for large-scale distributed sensor networks," in CCS '03, 2003.
-
CCS '03, 2003
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
9
-
-
85000276942
-
Multi-level j.1J tesla: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multi-level j.1J tesla: Broadcast authentication for distributed sensor networks," in TECS, 2004.
-
TECS, 2004
-
-
Liu, D.1
Ning, P.2
-
10
-
-
0003455038
-
Secrecy, authentication, and public key systems,
-
Ph.D. dissertation, Dept. of Electrical Engineering, Stanford Univ
-
R. C. Merkle, "Secrecy, authentication, and public key systems," Ph.D. dissertation, Dept. of Electrical Engineering, Stanford Univ.
-
-
-
Merkle, R.C.1
-
11
-
-
34547637204
-
Smock: A selfcontained public key management scheme for mission-critical wireless ad hoc networks
-
W. He, Y. Huang, K. Nahrstedt, and W. C. Lee, "Smock: A selfcontained public key management scheme for mission-critical wireless ad hoc networks," Percom, 2007.
-
(2007)
Percom
-
-
He, W.1
Huang, Y.2
Nahrstedt, K.3
Lee, W.C.4
-
12
-
-
74249107792
-
The stable marriage problem, and the coupon collectors problem
-
S. Har-Peled, "The stable marriage problem, and the coupon collectors problem," Lecture Notes.
-
Lecture Notes
-
-
Har-Peled, S.1
-
14
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Mobile Computing and Networking, 2000, pp. 243-254.
-
(2000)
Mobile Computing and Networking
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
15
-
-
70350231271
-
Rt-link: A time-synchronized link protocol for energy- constrained multi-hop wireless networks
-
R. R. R. Rowe, A. Mangharam, "Rt-link: A time-synchronized link protocol for energy- constrained multi-hop wireless networks," in SECON, 2006.
-
(2006)
SECON
-
-
Rowe, R.R.R.1
Mangharam, A.2
-
19
-
-
0036036742
-
Resilient overlay networks
-
D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris, "Resilient overlay networks," in Symposium on Operating Systems Principles, 2001.
-
(2001)
Symposium on Operating Systems Principles
-
-
Andersen, D.G.1
Balakrishnan, H.2
Kaashoek, M.F.3
Morris, R.4
-
20
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks," in MOBIQUITOUS 'OS, 2005.
-
MOBIQUITOUS 'OS, 2005
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
|