-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless sensor networks: a survey", Computer Networks, Vol.38, No.4, pp 393-422.
-
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
47349118294
-
Efficient saving in wireless sensor networks through hierarchical-based clustering
-
Marrakeche, Morocco, July
-
O.Moussaoui and al, "Efficient saving in wireless sensor networks through hierarchical-based clustering", In proceeding of the international IEEE Global Information Infrastructure Symposium, Marrakeche, Morocco, pp. 226-229, July, 2007.
-
(2007)
Proceeding of the International IEEE Global Information Infrastructure Symposium
, pp. 226-229
-
-
Moussaoui, O.1
-
3
-
-
4344668573
-
Overview of sensor networks
-
David Culler, Deborah Estrin, and Mani Srivastava, "Overview of Sensor Networks", IEEE Computer society, Vol.37, No.8, pp. 41-49, 2004
-
(2004)
IEEE Computer Society
, vol.37
, Issue.8
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
5
-
-
0003307344
-
A brief overview of ad hoc networks: Challenges and directions
-
R. Ramanathan and J. Redi, "A Brief Overview of Ad Hoc Networks: Challenges and Directions", IEEE Commun. Mag., vol.40, no.5, pp. 20-22, 2002.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.5
, pp. 20-22
-
-
Ramanathan, R.1
Redi, J.2
-
6
-
-
63149142734
-
Secured clustering algorithm for mobile ad hoc networks
-
March
-
Benamar KADRI, Abdallah M'HAMED, Mohammed FEHAM. "Secured Clustering Algorithm for Mobile Ad hoc Networks", International Journal of Computer Science and Network Security, Vol.7, No.3, pp 27-34; March 2007.
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.3
, pp. 27-34
-
-
Kadri, B.1
M'Hamed, A.2
Feham, M.3
-
7
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks", Communications of the ACM, vol.47, no.6, pp. 53-57, 2004
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
8
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Cambridge, MA, USA
-
N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs", in Proceedings of the Sixth Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), Cambridge, MA, USA, pp. 119-132, 2004.
-
(2004)
Proceedings of the Sixth Workshop on Cryptographic Hardware and Embedded Systems (CHES'04)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
9
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
Wander, A.S., Gura, N., Eberle, H., Gupta, V., and Shantz, S.C., "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks", In proceedings of PerCom pp. 324-328, 2005. (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
11
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," In IEEE Symposium on Security and Privacy, Berkeley, California, pp. 197-213, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
October
-
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," In ACM CCS 2003, pp. 62-72, October 2003
-
(2003)
ACM CCS 2003
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
13
-
-
4544293215
-
Location-based pairwise key establishments for relatively static sensor networks
-
October 31, George W. Johnson Center at George Mason University, Fairfax, VA, USA
-
D. Liu and P. Ning, "Location-Based Pairwise Key Establishments for Relatively Static Sensor Networks," in 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), October 31, 2003 George W. Johnson Center at George Mason University, Fairfax, VA, USA.
-
(2003)
2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)
-
-
Liu, D.1
Ning, P.2
-
15
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy
-
Perrig and al. "SPINS: Security Protocols for Sensor Networks", Mobile Computing and Networking, pp. 189-199, 2001 Rome, Italy.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
-
16
-
-
47349111860
-
A new management scheme of cluster based PKI for ad hoc networks using multi-signature
-
Marrakeche, Morocco
-
Benamar KADRI, Mohammed FEHAM, Abdallah M'HAMED. A new management scheme of cluster based PKI for ad hoc networks using multi-signature, In proceeding of the international IEEE Global Information Infrastructure Symposium, Marrakeche, Morocco, pp 167-172, 2007.
-
(2007)
Proceeding of the International IEEE Global Information Infrastructure Symposium
, pp. 167-172
-
-
Kadri, B.1
Feham, M.2
M'Hamed, A.3
-
17
-
-
0035789267
-
Secure pebblenets
-
S. Basagni, K. Herrin, E. Rosti and Danilo Bruschi. "Secure Pebblenets", Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 156-163, 2001.
-
(2001)
Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Rosti, E.3
Bruschi, D.4
-
19
-
-
14844304757
-
Securing sensor networks with public key technology
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk, "securing sensor networks with public key technology" In Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN '04), pages 59-64, 2004.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Tinypk, P.K.6
-
20
-
-
77951071937
-
The energy cost of cryptographic key establishment
-
ASIACCS
-
Johann.G, Alexanders, Stefan.T. "The Energy Cost of Cryptographic Key Establishment", in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 380-382, (ASIACCS 2007).
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 380-382
-
-
Johann, G.1
Alexanders, S.T.2
|