-
1
-
-
11144277843
-
Routing techniques in wireless sensor networks: A survey
-
Al-Karaki, J., Kamal, A.: Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communications 11(6), 6-28 (2004)
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 6-28
-
-
Al-Karaki, J.1
Kamal, A.2
-
2
-
-
0029700344
-
Decentralized trust management
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, pp. 164-173 (1996)
-
(1996)
Proceedings of 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
15344342877
-
A novel solution for achieving anonymity in wireless ad hoc networks
-
PE-WASUN'04 - Proceedings of the First ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
-
Boukerche, A., El-Khatib, K., Xu, L., Korba, L.: A novel solution for achieving anonymity in wireless ad hoc networks. In: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp. 30-38 (2004) (Pubitemid 40391424)
-
(2004)
PE-WASUN'04 - Proceedings of the First ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
, pp. 30-38
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
5
-
-
4544283175
-
Sori: A secure and objective reputation-based incentive scheme for ad hoc networks
-
He, Q., Wu, D., Khosla, P.: Sori: A secure and objective reputation-based incentive scheme for ad hoc networks. In: Proceedings of IEEE Wireless Communications and Networking Conference, pp. 825-830 (2004)
-
(2004)
Proceedings of IEEE Wireless Communications and Networking Conference
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
6
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
Kamvar, S., Schlosser, M., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web, pp. 640-651 (2003)
-
(2003)
Proceedings of the 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.1
Schlosser, M.2
Garcia-Molina, H.3
-
7
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
November 2004
-
Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proc. of ACM SenSys 2004 (November 2004)
-
(2004)
Proc. of ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
11
-
-
5044222209
-
A dynamic trust model for mobile ad hoc networks
-
Liu, Z., Joy, A., Thompson, R.: A dynamic trust model for mobile ad hoc networks. In: Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, pp. 80-85 (2004)
-
(2004)
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
, pp. 80-85
-
-
Liu, Z.1
Joy, A.2
Thompson, R.3
-
12
-
-
77951101884
-
-
Matlab
-
Matlab, http://www.mathworks.com
-
-
-
-
13
-
-
77951140083
-
-
Motelab
-
Motelab, http://motelab.eecs.harvard.edu
-
-
-
-
14
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R.,Wen,W., Culler, D., Tygar, J.: SPINS: Security protocols for sensor networks. Wireless Networks Journal (WINET) 8(5), 521-534 (2002)
-
(2002)
Wireless Networks Journal (WINET)
, vol.8
, Issue.5
, pp. 521-534
-
-
Szewczyk, P.A.1
Culler, D.2
Tygar, J.3
-
16
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
ACM, New York
-
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: SASN 2004: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59-64. ACM, New York (2004)
-
(2004)
SASN 2004: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
17
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
November 2003
-
Woo, A., Tong, T., Culler, D.: Taming the underlying challenges of reliable multihop routing in sensor networks. In: Proceedings of the First ACM SenSys 2003 (November 2003)
-
(2003)
Proceedings of the First ACM SenSys
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
18
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A., Stankovic, J.: Denial of service in sensor networks. Computer 35(10), 54-62 (2002)
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
|