-
1
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
S. Camtepe and B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 2007.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.2
-
-
Camtepe, S.1
Yener, B.2
-
2
-
-
39049142710
-
Securing localization with hidden and mobile base stations
-
S. Capkun, M. Cagalj, and M. Srivastava. Securing localization with hidden and mobile base stations. In INFOCOM, 2006.
-
(2006)
INFOCOM
-
-
Capkun, S.1
Cagalj, M.2
Srivastava, M.3
-
3
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. Inf. Theory, 29(2), 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
-
-
Dolev, D.1
Yao, A.2
-
4
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In CCS, 2002.
-
(2002)
CCS
-
-
Eschenauer, L.1
Gligor, V.2
-
5
-
-
33749595383
-
Achieving real-time target tracking using wireless sensor networks
-
T. He, P. Vicaire, T. Yan, L. Luo, L. Gu, G. Zhou, R. Stoleru, Q. Cao, J. Stankovic, and T. Abdelzaher. Achieving real-time target tracking using wireless sensor networks. In RTAS, 2006.
-
(2006)
RTAS
-
-
He, T.1
Vicaire, P.2
Yan, T.3
Luo, L.4
Gu, L.5
Zhou, G.6
Stoleru, R.7
Cao, Q.8
Stankovic, J.9
Abdelzaher, T.10
-
6
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
C. Kuo, M. Luk, R. Negi, and A. Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In SenSys, 2007.
-
(2007)
SenSys
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
7
-
-
11244264140
-
Serloc: Secure range-independent localization for wireless sensor networks
-
L. Lazos and R. Poovendran. Serloc: Secure range-independent localization for wireless sensor networks. WiSe, 2004.
-
(2004)
WiSe
-
-
Lazos, L.1
Poovendran, R.2
-
9
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In SASN, 2003.
-
(2003)
SASN
-
-
Liu, D.1
Ning, P.2
-
10
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
D. Liu, P. Ning, and W. K. Du. Attack-resistant location estimation in sensor networks. In IPSN, 2005.
-
(2005)
IPSN
-
-
Liu, D.1
Ning, P.2
Du, W.K.3
-
12
-
-
67549148698
-
Attack-tolerant localization via iterative verification of locations in sensor networks
-
Dec
-
T. Park and K. G. Shin. Attack-tolerant localization via iterative verification of locations in sensor networks. ACM Trans. on Embedded Computing Systems, 8(1), Dec 2008.
-
(2008)
ACM Trans. on Embedded Computing Systems
, vol.8
, Issue.1
-
-
Park, T.1
Shin, K.G.2
-
13
-
-
33845916834
-
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
-
January
-
R. Poovendran and L. Lazos. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1):27-59, January 2007.
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 27-59
-
-
Poovendran, R.1
Lazos, L.2
-
14
-
-
70349157241
-
A practical secure neighbor verification protocol for wireless sensor networks
-
R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux. A practical secure neighbor verification protocol for wireless sensor networks. In WiSec, 2009.
-
(2009)
WiSec
-
-
Shokri, R.1
Poturalski, M.2
Ravot, G.3
Papadimitratos, P.4
Hubaux, J.-P.5
-
15
-
-
20544473016
-
Walking GPS: A practical solution for localization in manually deployed wireless sensor networks
-
R. Stoleru, T. He, and J. Stankovic. Walking GPS: A practical solution for localization in manually deployed wireless sensor networks. In LCN, 2004.
-
(2004)
LCN
-
-
Stoleru, R.1
He, T.2
Stankovic, J.3
|