-
1
-
-
0036688074
-
A survery on sensor networks
-
Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E. A survery on sensor networks. IEEE Communications Magazine 2002; 40(8): 102-116.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-116
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
Atlanta, Georgia
-
Mainwaring A, Polastre J, Szewczyk R, Culler D, Anderson J. Wireless sensor networks for habitat monitoring. Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), Atlanta, Georgia, 2002; 88-97.
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA)
, pp. 88-97
-
-
Mainwaring, A.1
Polastre, J.2
Szewczyk, R.3
Culler, D.4
Anderson, J.5
-
3
-
-
51249084123
-
AICN: An efficient algorithm to identify compromised nodes in wireless sensor network
-
Beijing, China, May
-
Lu R, Lin X, Zhang C, Zhu H, Ho PH, Shen X. AICN: an efficient algorithm to identify compromised nodes in wireless sensor network. International Conference on Communications (ICC 2008), Beijing, China, May 2008; 1499-1504.
-
(2008)
International Conference on Communications (ICC 2008)
, pp. 1499-1504
-
-
Lu, R.1
Lin, X.2
Zhang, C.3
Zhu, H.4
Ho, P.H.5
Shen, X.6
-
4
-
-
0036375244
-
Impact of network density on data aggregation in wireless sensor networks
-
Vienna, Austria, July
-
Intanagonwiwat C, Estrin D, Govindan R, Hellerstein J. Impact of network density on data aggregation in wireless sensor networks. Proceedings of the 22nd International Conference on Distributed Computating Systems (ICDCS 2002), Vienna, Austria, July 2002; 457-458.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computating Systems (ICDCS 2002)
, pp. 457-458
-
-
Intanagonwiwat, C.1
Estrin, D.2
Govindan, R.3
Hellerstein, J.4
-
6
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
Los Angeles, CA, USA, November
-
Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, USA, November 2003; 255-265.
-
(2003)
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys)
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
8
-
-
49449109253
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Yang Y, Wang X, Zhu S, Cao G. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. ACMTransactions on Information and System Security (TISSEC) 2008; 11(4): 1-43.
-
(2008)
ACMTransactions on Information and System Security (TISSEC)
, vol.11
, Issue.4
, pp. 1-43
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
9
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptations
-
Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptations. IEEE Transactions on Mobile Computing 2006; 5(10): 1417-1431.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
10
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
Anchorage, Alaska, USA, May
-
He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T. PDA: privacy-preserving data aggregation in wireless sensor networks. Proceedings of 26th IEEE International Conference on Computer Communications (Infocom 2007), Anchorage, Alaska, USA, May 2007; 2045-2053.
-
(2007)
Proceedings of 26th IEEE International Conference on Computer Communications (Infocom 2007)
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
11
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
San Diego, CA, USA, July
-
Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (IEEE Mobi Quitous'05), San Diego, CA, USA, July 2005; 2045-2053.
-
(2005)
Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (IEEE Mobi Quitous'05)
, pp. 2045-2053
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
12
-
-
51349116601
-
Confidentiality protection for distributed sensor data aggregation
-
Phoenix, AZ, USA, April
-
Feng T, Wang C, Zhang W, Ruan L. Confidentiality protection for distributed sensor data aggregation. Proceedings of 27th IEEE International Conference on Computer Communications (Infocom 2008), Phoenix, AZ, USA, April 2008; 475-483.
-
(2008)
Proceedings of 27th IEEE International Conference on Computer Communications (Infocom 2008)
, pp. 475-483
-
-
Feng, T.1
Wang, C.2
Zhang, W.3
Ruan, L.4
-
13
-
-
77952044694
-
-
Enviromon.net, a division of Netmon Inc
-
Enviromon.net, a division of Netmon Inc. http://www.enviromon.net/.
-
-
-
-
14
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
-
Du X, Xiao Y, Guizani M, Chen H. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks 2007; 5(1): 24-34. (Pubitemid 44573000)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.-H.4
-
15
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Santa Barbara, California, USA, LNCS 2139. Springer-Verlag: New York
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Proceedings of Advances in Cryptology (Crypto 2001), Santa Barbara, California, USA, LNCS 2139. Springer-Verlag: New York, 2001; 213-229.
-
(2001)
Proceedings of Advances in Cryptology (Crypto 2001)
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
17
-
-
33746898272
-
The k-neighbors approach to interference bounded and symmetric topology control in ad hoc networks
-
Blough D, Leoncini M, Resta G, Santi P. The k-neighbors approach to interference bounded and symmetric topology control in ad hoc networks. IEEE Transactions on Mobile Computing 2006; 5(9): 1267-1282.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.9
, pp. 1267-1282
-
-
Blough, D.1
Leoncini, M.2
Resta, G.3
Santi, P.4
-
19
-
-
33144476837
-
Location based security mechanisms in wireless sensor networks
-
Zhang Y, Liu W, Lou W, Fang Y. Location based security mechanisms in wireless sensor networks. IEEE Journal On Selected Areas In Communications 2006; 24(2): 247-260.
-
(2006)
IEEE Journal On Selected Areas In Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
21
-
-
33646581008
-
Energy analysis of public key cryptography on small wireless devices
-
Hawaii, USA, March
-
Wander A, Gura N, Eberle H, Gupta V, Shantz S. Energy analysis of public key cryptography on small wireless devices. IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), Hawaii, USA, March 2005; 324-328.
-
(2005)
IEEE International Conference on Pervasive Computing and Communications (PerCom 2005)
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
22
-
-
36248933437
-
LEDS: Providing locationaware end-to-end data security in wireless sensor networks
-
Barcelona, Spain, April
-
Ren K, Lou W, Zhang Y. LEDS: providing locationaware end-to-end data security in wireless sensor networks. Proceedings of 25th IEEE International Conference on Computer Communications (Infocom 2006), Barcelona, Spain, April 2006; 1-12.
-
(2006)
Proceedings of 25th IEEE International Conference on Computer Communications (Infocom 2006)
, pp. 1-12
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
23
-
-
46749097974
-
Tiny Tate: Computing the tate pairing in resource-constrained sensor nodes
-
Cambridge, Massachusetts, USA, July
-
Oliveira L, Aranha D, Morais E, Daguano F, Lopez J, Dahab R. Tiny Tate: computing the tate pairing in resource-constrained sensor nodes. Proceedings of Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), Cambridge, Massachusetts, USA, July 2007; 318-323.
-
(2007)
Proceedings of Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)
, pp. 318-323
-
-
Oliveira, L.1
Aranha, D.2
Morais, E.3
Daguano, F.4
Lopez, J.5
Dahab, R.6
-
24
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Santa Barbara, California, USA, LNCS 2442. Springer-Verlag: New York
-
Barreto P, Kim H, Bynn B, Scott M. Efficient algorithms for pairing-based cryptosystems. Proceedings of Advances in Cryptology (Crypto 2002), Santa Barbara, California, USA, LNCS 2442. Springer-Verlag: New York, 2002; 354-368.
-
(2002)
Proceedings of Advances in Cryptology (Crypto 2002)
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
25
-
-
77952027114
-
-
Intel PXA255 Processor Electrical, Mechanical, and Thermal Specification. Available online at:
-
Intel PXA255 Processor Electrical, Mechanical, and Thermal Specification. Available online at: http://www.intel. com/design/pca/applicationsprocessors/ manuals/278780.htm
-
-
-
-
26
-
-
33144485152
-
Computing Tate pairing on smartcards
-
Available online at:
-
Bertoni G, Chen L, Fragneto P, Harrison K, Pelosil G. Computing Tate pairing on smartcards. White Paper STMICROELECTRONICS, 2005. Available online at: http://www.st.com/stonline/products/families/smartcard/ast ibe.htm.
-
(2005)
White Paper STMICROELECTRONICS
-
-
Bertoni, G.1
Chen, L.2
Fragneto, P.3
Harrison, K.4
Pelosil, G.5
|