-
1
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May
-
Blaze, M., Feigenbaum, J. and Lacy, J. (1996) 'Decentralized trust management', IEEE Symposium on Security and Privacy, Oakland, CA, May, pp.164-173.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
2
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, CA, May
-
Chan, H., Perrig, A. and Song, D. (2003) 'Random key predistribution schemes for sensor networks', IEEE Symposium on Security and Privacy, Berkeley, CA, May, pp.197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
November
-
Dahill, B., Levine, B.N., Royer, E. and Shields, C. (2002) 'A secure routing protocol for ad hoc networks', Proceedings of the International Conference on Network Protocols (ICNP), November.
-
(2002)
Proceedings of the International Conference on Network Protocols (ICNP)
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
5
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hong Kong, China
-
Du, W., Deng, J., Han, Y.S., Chen, S. and Varshney, P.K. (2004) 'A key management scheme for wireless sensor networks using deployment knowledge', Proceedings of the 23rd Conference of the IEEE Communications Society (Infocom '04), Hong Kong, China.
-
(2004)
Proceedings of the 23rd Conference of the IEEE Communications Society (Infocom '04)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
6
-
-
0013043106
-
Highly resilient, energy efficient multipath routing in wireless sensor networks
-
Ganesan, D., Govindan, R., Shenker, S. and Estrin, D. (2002) 'Highly resilient, energy efficient multipath routing in wireless sensor networks', Mobile Computing and Communications Review (MC2R), Vol. 1, No. 2.
-
(2002)
Mobile Computing and Communications Review (MC2R)
, vol.1
, Issue.2
-
-
Ganesan, D.1
Govindan, R.2
Shenker, S.3
Estrin, D.4
-
7
-
-
0036957315
-
Ariadne: A secure ondemand routing protocol for ad hoc networks
-
Atlanta, Georgia, USA, September
-
Hu, Y.C., Perring, A. and Johnson, D.B. (2002) 'Ariadne: a secure ondemand routing protocol for ad hoc networks', Proceedings of ACM MOBICOM, Atlanta, Georgia, USA, September, pp.12-23.
-
(2002)
Proceedings of ACM MOBICOM
, pp. 12-23
-
-
Hu, Y.C.1
Perring, A.2
Johnson, D.B.3
-
8
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Hu, Y.C., Perring, A. and Johnson, D.B. (2003) 'Rushing attacks and defense in wireless ad hoc network routing protocols', Proceedings of 2nd ACM Wireless Security (WiSe'03), pp.30-40.
-
(2003)
Proceedings of 2nd ACM Wireless Security (WiSe'03)
, pp. 30-40
-
-
Hu, Y.C.1
Perring, A.2
Johnson, D.B.3
-
9
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, AK, May
-
Karlof, C. andWagner, D. (2003) 'Secure routing in wireless sensor networks: attacks and countermeasures', Proceedings of the 1st IEEE InternationalWorkshop on Sensor Network Protocols and Applications, Anchorage, AK, May.
-
(2003)
Proceedings of the 1st IEEE InternationalWorkshop on Sensor Network Protocols and Applications
-
-
Karlof, C.1
Wagner, D.2
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti, S., Giuli, T., Lai, K. and Baker, M. (2000) 'Mitigating routing misbehavior in mobile ad hoc networks', Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.255-265.
-
(2000)
Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
11
-
-
0141862713
-
The meaning of Trust
-
Carlson School of Management, University of Minnesota
-
McKnight, D.H. and Chervany, N.L. (1996) 'The meaning of Trust', Technical Report 94-04, Carlson School of Management, University of Minnesota.
-
(1996)
Technical Report 94-04
-
-
McKnight, D.H.1
Chervany, N.L.2
-
13
-
-
0033314753
-
An overview of PKI trust models
-
Perlman, R. (1999) 'An overview of PKI trust models', IEEE Network, Vol. 13, No. 6, pp.38-43.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 38-43
-
-
Perlman, R.1
-
14
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Cullar, D. and Tygar, J. (2002) 'Spins: security protocols for sensor networks', Wireless Networks Journal (WINET), Vol. 8, No. 5, pp.521-534.
-
(2002)
Wireless Networks Journal (WINET)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.5
-
15
-
-
11144340927
-
Designing secure sensor networks
-
Shi, E. and Perrig, A. (2004) 'Designing secure sensor networks', Wireless Communication Magazine, December, Vol. 11, No. 6.
-
(2004)
Wireless Communication Magazine, December
, vol.11
, Issue.6
-
-
Shi, E.1
Perrig, A.2
-
16
-
-
84871442641
-
On communication security in wireless ad-hoc sensor network
-
Pittsburgh, Pennsylvania, USA, June
-
Slijepcevic, S., Tsiatsis, V., Zimbeck, S., Srivastava, M. and Potkonjak, M. (2002) 'On communication security in wireless ad-hoc sensor network', Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), Pittsburgh, Pennsylvania, USA, June, pp.139-144.
-
(2002)
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02)
, pp. 139-144
-
-
Slijepcevic, S.1
Tsiatsis, V.2
Zimbeck, S.3
Srivastava, M.4
Potkonjak, M.5
-
17
-
-
0012979825
-
A taxonomy of wireless micro-sensor network models
-
April
-
Tilak, S., Abu-ghazaleh, N.B. and Heinzelman, W. (2002) 'A taxonomy of wireless micro-sensor network models', ACM SIGMobile Computing and Communications Review (MC2R), April , Vol. 6, pp.28-36.
-
(2002)
ACM SIGMobile Computing and Communications Review (MC2R)
, vol.6
, pp. 28-36
-
-
Tilak, S.1
Abu-Ghazaleh, N.B.2
Heinzelman, W.3
-
18
-
-
0027266208
-
Trust relationships in secure systems - A distributed authentication perspective
-
Yahalom, R., Klein, B. and Beth, T. (1993) 'Trust relationships in secure systems-a distributed authentication perspective', Proceedings, IEEE Symposium on Research in Security and Privacy, pp.150-164.
-
(1993)
Proceedings IEEE Symposium on Research in Security and Privacy
, pp. 150-164
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
19
-
-
41149110884
-
A security framework with trust management for sensor networks
-
Athens, Greece, September
-
Yao, Z.Y., Kim, D., Lee, I., Kim, K. and Jang, J. (2005) 'A security framework with trust management for sensor networks', Security and Privacy for Emerging Areas in Communication Networks, Workshop of the 1st International Conference on Security and QOS in Communication Networks, Athens, Greece, September, pp.190-198.
-
(2005)
Security and Privacy for Emerging Areas in Communication Networks, Workshop of the 1st International Conference on Security and QOS in Communication Networks
, pp. 190-198
-
-
Yao, Z.Y.1
Kim, D.2
Lee, I.3
Kim, K.4
Jang, J.5
|