-
1
-
-
33646589837
-
An Application-Specific Protocol Architecture for Wireless Microsensor Networks
-
Oct
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE Transactions on Wireless Communications, Vol.1, No.4, Oct. 2002.
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
2
-
-
33747142749
-
The Capacity of Wireless Networks
-
Mar
-
P. Gupta and P. R. Kumar, The Capacity of Wireless Networks, IEEE Transactions on Information Theory, Vol,46, No.2, pp.388-404, Mar. 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
3
-
-
0141509887
-
-
E. J. Duarte-Melo and M. Liu, Data-gathering Wireless Sensor Networks:Organization and Capacity,43, Issues.4, pp.519-537, Nov. 2003.
-
E. J. Duarte-Melo and M. Liu, Data-gathering Wireless Sensor Networks:Organization and Capacity,Vol.43, Issues.4, pp.519-537, Nov. 2003.
-
-
-
-
4
-
-
33751064353
-
A framework for distributed key management schemes in heterogeneous wireless sensor networks
-
Arizona, USA, April 10-12
-
K. Lu, Y. Qian and J. Hu, A framework for distributed key management schemes in heterogeneous wireless sensor networks, The 25th IEEE International Conference on Performance, Computing, and Communications (IPCCC), pp.513-519, Arizona, USA, April 10-12, 2006.
-
(2006)
The 25th IEEE International Conference on Performance, Computing, and Communications (IPCCC)
, pp. 513-519
-
-
Lu, K.1
Qian, Y.2
Hu, J.3
-
5
-
-
77949924907
-
Taxonomy of Attacks on Wireless Sensor Networks
-
December
-
S. Han, E. Chang, L. Gao, T. S. Dillon, Taxonomy of Attacks on Wireless Sensor Networks, Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), Springer Press, Springer LinkDate: December 2007.
-
(2007)
Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), Springer Press, Springer LinkDate
-
-
Han, S.1
Chang, E.2
Gao, L.3
Dillon, T.S.4
-
6
-
-
27244436587
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
-
Aug
-
N. Gura, A. Patal, A. Wander, H. Eberle, S. C. Shantz, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, Proceedings of the 6th International Workshop on Cryptographic Hardware and Embeded System, Aug. 2004.
-
(2004)
Proceedings of the 6th International Workshop on Cryptographic Hardware and Embeded System
-
-
Gura, N.1
Patal, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
11
-
-
8344262333
-
-
INFOCOM
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge, Proceedings of IEEE Conference on Computer and Communications (INFOCOM), 2004.
-
(2004)
A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge, Proceedings of IEEE Conference on Computer and Communications
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
12
-
-
33750023217
-
An Effective Key Management Scheme for Heterogeneous Sensor Networks
-
X. Du, Y. Xiao, M. Guizani, and H. H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks. Ad Hoc Network, No.5. Vol.1, pp.24-34, 2007.
-
(2007)
Ad Hoc Network
, vol.1
, Issue.5
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.H.4
-
13
-
-
45849089959
-
-
F. Kausar, S. Hussain, L. T. Yang, and A. Masood, Scalable and Efficient Key Management for Heterogeneous Sensor Networks, Special Issues in Journal of Supercomputing, pp.44-65, 2008.
-
(2008)
Scalable and Efficient Key Management for Heterogeneous Sensor Networks, Special Issues in Journal of Supercomputing
, pp. 44-65
-
-
Kausar, F.1
Hussain, S.2
Yang, L.T.3
Masood, A.4
-
14
-
-
70349321153
-
Key Predistribution Scheme using Keyed-Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks
-
Mar
-
S. Hussain, M. S. Rahman, and L. T. Yang, Key Predistribution Scheme using Keyed-Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks, IEEE International Conference on Pervasive Computing and Communication, pp.1-6, Mar. 2009.
-
(2009)
IEEE International Conference on Pervasive Computing and Communication
, pp. 1-6
-
-
Hussain, S.1
Rahman, M.S.2
Yang, L.T.3
-
15
-
-
52049104960
-
A Self-healing Key Distribution Scheme Based on Vector Space Secret Sharing and One Way Hash Chains
-
Newport Beach, CA, USA, Jun. 23-27
-
B. Tian, S. Han, T. S. Dillon, S. Das, A Self-healing Key Distribution Scheme Based on Vector Space Secret Sharing and One Way Hash Chains, Proceedings of the 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Newport Beach, CA, USA, Jun. 23-27, 2008.
-
(2008)
Proceedings of the 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
-
-
Tian, B.1
Han, S.2
Dillon, T.S.3
Das, S.4
-
16
-
-
65949120002
-
Efficient Threshold Self-healing Key Distribution with Sponsorization for Infrastructureless Wireless Networks
-
Apr
-
S. Han, B. Tian, M. He, E. Chang, Efficient Threshold Self-healing Key Distribution with Sponsorization for Infrastructureless Wireless Networks, The IEEE Transactions on Wireless Communications, Vol.8, No.4, pp.1876-1887, Apr. 2009.
-
(2009)
The IEEE Transactions on Wireless Communications
, vol.8
, Issue.4
, pp. 1876-1887
-
-
Han, S.1
Tian, B.2
He, M.3
Chang, E.4
|