-
1
-
-
27644494768
-
An analysis of a large scale habit monitoring application
-
R. Szewczky, A. Mainwaring, J. Anderson, and D. Culler, "An analysis of a large scale habit monitoring application," in Sensys'04, 2004.
-
(2004)
Sensys'04
-
-
Szewczky, R.1
Mainwaring, A.2
Anderson, J.3
Culler, D.4
-
2
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS'02, 2002.
-
(2002)
ACM CCS'02
-
-
Eschenauer, L.1
Gligor, V.D.2
-
3
-
-
33745639957
-
-
Technical Report CU-CS-990-05, Dept. of Comp Sci, Univ of Colorado at Boulder, Jan
-
C. Hartung, J. Balasalle, and R. Han, "Node compromise in sensor networks: the need for secure systems," in Technical Report CU-CS-990-05, Dept. of Comp Sci, Univ of Colorado at Boulder, Jan 2005.
-
(2005)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
4
-
-
38149062124
-
Security in wireless sensor networks
-
V. C. Giruka, M. Singhal, J. Royalty and S. Varanasi, "Security in wireless sensor networks", Wireless Communications and Mobile Computing, Vol. 8, No. 1, pp. 1-24, 2008.
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.1
, pp. 1-24
-
-
Giruka, V.C.1
Singhal, M.2
Royalty, J.3
Varanasi, S.4
-
5
-
-
36849024896
-
Sensor node compromise detection: The location perspective
-
H. Song, L. Xie, S. Zhu, and G. Cao, "Sensor node compromise detection: the location perspective," in IWCMC'07, Honolulu, Hawaii, USA, Aug. 2007.
-
IWCMC'07, Honolulu, Hawaii, USA, Aug. 2007
-
-
Song, H.1
Xie, L.2
Zhu, S.3
Cao, G.4
-
6
-
-
36849045829
-
Detection and handling of mac layer misbehavior in wireless networks
-
P. Kyasanur and H. Vaidya, "Detection and handling of mac layer misbehavior in wireless networks," in IEEE DSN, 2003.
-
(2003)
IEEE DSN
-
-
Kyasanur, P.1
Vaidya, H.2
-
7
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks," in IEEE Symposium on Security and Privacy'04, 2004.
-
IEEE Symposium on Security and Privacy'04, 2004
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
8
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward resilient security in wireless sensor networks," in ACM MobiHoc'05, 2005.
-
(2005)
ACM MobiHoc'05
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
9
-
-
36849064844
-
Catching moles in sensor networks
-
Jun
-
F. Ye, H. Yang, and Z. Liu, "Catching moles in sensor networks," in IEEE ICDCS'07, Jun, 2007.
-
(2007)
IEEE ICDCS'07
-
-
Ye, F.1
Yang, H.2
Liu, Z.3
-
10
-
-
33748537883
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
Oct.
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla, "Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms," in SOSP, Oct. 2005.
-
(2005)
SOSP
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
11
-
-
85002390908
-
Reflection as a mechanism for software integrity verfication
-
D. Spinellis, "Reflection as a mechanism for software integrity verfication," in ACM Trans. Inf. Syst. Secu., Vol, 3, No, 1, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secu.
, vol.3
, Issue.1
-
-
Spinellis, D.1
-
12
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
October
-
Y. Yang, X. Wang, S. Zhu, and G. Cao, "Distributed software-based attestation for node compromise detection in sensor networks," in IEEE SRDS, October 2007.
-
(2007)
IEEE SRDS
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
13
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
SPOTS Track April
-
A. Liu and P. Ning, "TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN 2008, SPOTS Track, pp. 245-256, April 2008.
-
(2008)
IPSN 2008
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
14
-
-
46849122785
-
Efficient Implementation of Public Key Cryptosystems on Mote Sensors
-
H. Wang and Q. Li, "Efficient Implementation of Public Key Cryptosystems on Mote Sensors," in International Conference on Information and Communication Security (ICICS), Raleigh, NC, Dec. 4-7, 2006.
-
International Conference on Information and Communication Security (ICICS), Raleigh, NC, Dec. 4-7, 2006
-
-
Wang, H.1
Li, Q.2
-
15
-
-
84941637905
-
Signing on a Postcard
-
Financial Cryptography - FC 2000, Springer-Verlag
-
D. Nacache and J. Stern, "Signing on a Postcard," in Financial Cryptography - FC 2000, LNCS 1962, pp. 121-135, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.1962
, pp. 121-135
-
-
Nacache, D.1
Stern, J.2
-
16
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
X. Du, Y. Xiao, M. Guizani, and H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Networks 2007; 5(1): 24-34.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.4
-
17
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks", in CCS 2003, Washington D.C., USA, Oct. 2003, pp. 52-61.
-
CCS 2003, Washington D.C., USA, Oct. 2003
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
|