-
1
-
-
84876606620
-
-
Crossbow Technology Company: San Jose, CA, USA; Available online, accessed May 06
-
Crossbow Technology Company: San Jose, CA, USA; Available online: http://www.xbow.com/, accessed May 06, 2009.
-
(2009)
-
-
-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Networks 2002, 38, 393-422.
-
(2002)
Comput. Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
84876619832
-
IP multicast applications: Challenges and solutions
-
Available online, accessed May 06
-
Quinn, B.; Almeroth, K. IP multicast applications: Challenges and solutions. Internet RFC 3170. Available online: http://www.ietf.org, accessed May 06, 2009.
-
(2009)
Internet RFC 3170
-
-
Quinn, B.1
Almeroth, K.2
-
5
-
-
33745759519
-
Authenticated queries in sensor networks
-
Benenson, Z. Authenticated queries in sensor networks. Lect. Notes Comput. Sc. 2005, 3813, 54-67.
-
(2005)
Lect. Notes Comput. Sc
, vol.3813
, pp. 54-67
-
-
Benenson, Z.1
-
6
-
-
0017930809
-
A Method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L.; Shamir, A.; Adleman, L. A Method for obtaining digital signatures and public-key cryptosystems. CACM 1978, 21, 120-126.
-
(1978)
CACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
7
-
-
0003614758
-
-
MIT Technical Report: TR-212, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA
-
Rabin, M. Digitalized signatures and public-key functions as intractable as factorization. MIT Technical Report: TR-212, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA, 1979.
-
(1979)
Digitalized Signatures and Public-key Functions As Intractable As Factorization
-
-
Rabin, M.1
-
8
-
-
33745834406
-
-
ACM 2nd International Workshop on Ubiquitous Computing, INSTICC Press: Miami, USA, May
-
Blaß, E.-O.; Zitterbart, M. Towards acceptable public-key encryption in sensor networks. ACM 2nd International Workshop on Ubiquitous Computing, INSTICC Press: Miami, USA, May 2005.
-
(2005)
Towards Acceptable Public-key Encryption In Sensor Networks
-
-
Blaß, E.-O.1
Zitterbart, M.2
-
9
-
-
33750904440
-
Unleashing public-key cryptography in wireless sensor networks
-
Lopez, J. Unleashing public-key cryptography in wireless sensor networks. J. Comput. Sec. 2006, 14,469-482.
-
(2006)
J. Comput. Sec
, vol.14
, pp. 469-482
-
-
Lopez, J.1
-
10
-
-
0242270877
-
Aggregated hierarchical multicast a many-to-many communication paradigm using programmable networks
-
Wolf, T.; Choi, S.Y. Aggregated hierarchical multicast a many-to-many communication paradigm using programmable networks. IEEE T. Syst. Man Cybe. Part C 2003, 33, 358-369.
-
(2003)
IEEE T. Syst. Man Cybe. Part C
, vol.33
, pp. 358-369
-
-
Wolf, T.1
Choi, S.Y.2
-
11
-
-
84861651299
-
Secure acknowledgement of multicast messages in open peer-to-peer networks
-
San Diego, CA, USA
-
Nicolosi, A.; Mazieres, D. Secure acknowledgement of multicast messages in open peer-to-peer networks. In Proceedings of 3rd International Workshop on Peer-to-Peer Systems, San Diego, CA, USA, 2004.
-
(2004)
In Proceedings of 3rd International Workshop On Peer-to-Peer Systems
-
-
Nicolosi, A.1
Mazieres, D.2
-
12
-
-
33646340128
-
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput
-
Castelluccia, C.; Jarecki, S.; Kim, J.; Tsudik, G. Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 2006, 50, 1639-1652.
-
(2006)
Networks
, vol.50
, pp. 1639-1652
-
-
Castelluccia, C.1
Jarecki, S.2
Kim, J.3
Tsudik, G.4
-
13
-
-
35248880074
-
Efficient threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme
-
Boldyreva, A. Efficient threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. Lect. Notes Comput. Sc. 2003, 2567, 31-46.
-
(2003)
Lect. Notes Comput. Sc
, vol.2567
, pp. 31-46
-
-
Boldyreva, A.1
-
14
-
-
84946840347
-
Short signatures from the Weil pairing
-
Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. Lect. Notes Comput. Sc. 2001, 2248, 514-53.
-
(2001)
Lect. Notes Comput. Sc
, vol.2248
, pp. 514-553
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
15
-
-
34247495384
-
Secure reverse communications in a multicast tree
-
Domingo-Ferrer, J.; Martínez-Ballesté, A.; Sebé, F. Secure reverse communications in a multicast tree. Lect. Notes Comput. Sc. 2004, 3042, 807-816.
-
(2004)
Lect. Notes Comput. Sc
, vol.3042
, pp. 807-816
-
-
Domingo-Ferrer, J.1
Martínez-Ballesté, A.2
Sebé, F.3
-
16
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Okamoto, T.; Uchiyama, S. A new public-key cryptosystem as secure as factoring. Lect. Notes Comput. Sc. 1998, 1403, 308-318.
-
(1998)
Lect. Notes Comput. Sc
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
17
-
-
33749642078
-
Scalability and security in biased many-to-one communication
-
Sebé, F.; Domingo-Ferrer, J. Scalability and security in biased many-to-one communication. Comput. Networks 2007, 51, 1-13.
-
(2007)
Comput. Networks
, vol.51
, pp. 1-13
-
-
Sebé, F.1
Domingo-Ferrer, J.2
-
18
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
Los Angeles, CA, USA
-
Przydatek, B.; Song, D.; Perrig, A. SIA: Secure information aggregation in sensor networks. In Proceedings of 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, 2003.
-
(2003)
Proceedings of 1st International Conference On Embedded Networked Sensor Systems
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
19
-
-
33745312679
-
Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
-
Dimitriou, T. Efficient mechanisms for secure inter-node and aggregation processing in sensor networks. Lect. Notes Comput. Sc. 2005, 3738, 18-31.
-
(2005)
Lect. Notes Comput. Sc
, vol.3738
, pp. 18-31
-
-
Dimitriou, T.1
-
20
-
-
38449121748
-
Securing communication trees in sensor networks
-
Dimitriou, T. Securing communication trees in sensor networks. Lect. Notes Comput. Sc. 2006, 4240,47-58.
-
(2006)
Lect. Notes Comput. Sc
, vol.4240
, pp. 47-58
-
-
Dimitriou, T.1
-
21
-
-
84943753034
-
Secure aggregation for wireless network
-
Orlando, Florida, January 27-31
-
Hu, L.; Evans, D. Secure aggregation for wireless network. In Proceedings of Symposium on Applications and the Internet Workshops, IEEE Computer Society, Orlando, Florida, January 27-31, 2003.
-
(2003)
In Proceedings of Symposium On Applications and The Internet Workshops, IEEE Computer Society
-
-
Hu, L.1
Evans, D.2
-
22
-
-
70249146943
-
Securely computing an approximate median in wireless sensor network
-
Istanbul, Turkey
-
Roy, S.; Conti, M.; Setia, S.; Jajodia, S. Securely computing an approximate median in wireless sensor network. In Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, 2008.
-
(2008)
In Proceedings of The 4th International Conference On Security and Privacy In Communication Networks
-
-
Roy, S.1
Conti, M.2
Setia, S.3
Jajodia, S.4
-
23
-
-
33748089962
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Florence, Italy, May 22-25
-
Yang, Y.; Wang, X.; Zhu, S.; Cao, G. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, Florence, Italy, May 22-25, 2006; pp. 356-367.
-
(2006)
In Proceedings of The 7th ACM Interational Symposium On Mobile Ad Hoc Networking and Computing
, pp. 356-367
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
24
-
-
70349333429
-
Secure data aggregation in wireless sensor networks: A survey
-
Wollongong, Australia, January
-
Alzaid, H.; Foo, E.; Gonzalez-Nieto, J.M. Secure data aggregation in wireless sensor networks: a survey. In Proceedings of the Australasian Information Security Conference, Wollongong, Australia, January 2008.
-
(2008)
In Proceedings of The Australasian Information Security Conference
-
-
Alzaid, H.1
Foo, E.2
Gonzalez-Nieto, J.M.3
-
25
-
-
35048828372
-
Efficient secure aggregation in sensor networks
-
Jadia, P.; Mathuria, A. Efficient secure aggregation in sensor networks. Lect. Notes Comput. Sc. 2004,3296,40-49.
-
(2004)
Lect. Notes Comput. Sc
, vol.3296
, pp. 40-49
-
-
Jadia, P.1
Mathuria, A.2
-
26
-
-
0023408117
-
Processing encrypted data
-
Ahituv, N.; Lapid, Y.; Neumann, S. Processing encrypted data. CACM 1987, 30, 777-780.
-
(1987)
CACM
, vol.30
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
27
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
San Diego, California, July
-
Castelluccia, C.; Mykletun, E.; Tsudik, G. Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of the 2nd IEEE Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, California, July 2005; pp. 1-9.
-
(2005)
In Proceedings of The 2nd IEEE Annual International Conference On Mobile and Ubiquitous Systems: Networking and Services
, pp. 1-9
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
28
-
-
51949088331
-
ABBA: A Balls and bins approach to secure aggregation in WSNs
-
Ad Hoc, and Wireless Networks WiOPT 2008, Las Vegas, Nevada, March 31-April 3
-
Castelluccia, C.; Soriente, C. ABBA: A Balls and bins approach to secure aggregation in WSNs. In Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks WiOPT 2008, Las Vegas, Nevada, March 31-April 3, 2008, pp. 185-191.
-
(2008)
In Proceedings of The 6th International Symposium On Modeling and Optimization In Mobile
, pp. 185-191
-
-
Castelluccia, C.1
Soriente, C.2
-
29
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaption
-
Westhoff, D.; Girao, J.; Acharya, M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaption. IEEE Trans. Mob. Comput. 2006,5,1417-1431.
-
(2006)
IEEE Trans. Mob. Comput
, vol.5
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
30
-
-
51849137350
-
An efficient and verifiable concealed data aggregation scheme in wireless sensor networks
-
Chengdu, China
-
Sun, H.M.; Hsiao, Y.C.; Lin, Y.H.; Chen, C.M. An efficient and verifiable concealed data aggregation scheme in wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Software and Systems, Chengdu, China, 2008; pp. 19-26.
-
(2008)
In Proceedings of The 2nd International Conference On Embedded Software and Systems
, pp. 19-26
-
-
Sun, H.M.1
Hsiao, Y.C.2
Lin, Y.H.3
Chen, C.M.4
-
31
-
-
67749118172
-
Confidentiality and integrity for data aggregation in WSN using peer monitoring
-
Di Pietro, R.; Michiardi, P.; Molva, R. Confidentiality and integrity for data aggregation in WSN using peer monitoring. Secur. Commun. Networks J. 2009, 2, 181-194.
-
(2009)
Secur. Commun. Networks J
, vol.2
, pp. 181-194
-
-
di Pietro, R.1
Michiardi, P.2
Molva, R.3
-
32
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
Anchorage Alaska, USA, 6-12 May
-
Wenbo, H.; Xue, L.; Hoang, N.; Nahrstedt, K.; Abdelzaher, T.T. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Computer Communications, Anchorage Alaska, USA, 6-12 May, 2007; pp. 2045-2053.
-
(2007)
In Proceedings of The 26th IEEE International Conference On Computer Communications
, pp. 2045-2053
-
-
Wenbo, H.1
Xue, L.2
Hoang, N.3
Nahrstedt, K.4
Abdelzaher, T.T.5
-
34
-
-
84994296501
-
The impact of data aggregation in wireless sensor networks
-
Vienna, Austria, July 2-5
-
Krishnamachari, B.; Estrin, D.; Wicker, S.B. The impact of data aggregation in wireless sensor networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems, Vienna, Austria, July 2-5, 2002; pp. 575-578.
-
(2002)
In Proceedings of The 22nd International Conference On Distributed Computing Systems
, pp. 575-578
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.B.3
-
35
-
-
34247495512
-
Secure many-to-one symbol transmission for implementation on smart cards
-
Sebé, F.; Viejo, A.; Domingo-Ferrer, J. Secure many-to-one symbol transmission for implementation on smart cards. Comput. Networks 2007, 51, 2299-2307.
-
(2007)
Comput. Networks
, vol.51
, pp. 2299-2307
-
-
Sebé, F.1
Viejo, A.2
Domingo-Ferrer, J.3
-
36
-
-
44549083870
-
Secure and scalable many-to-one symbol transmission for sensor networks
-
Viejo, A.; Sebé, F.; Domingo-Ferrer, J. Secure and scalable many-to-one symbol transmission for sensor networks. Comput. Commun. 2008, 31, 2408-2413.
-
(2008)
Comput. Commun
, vol.31
, pp. 2408-2413
-
-
Viejo, A.1
Sebé, F.2
Domingo-Ferrer, J.3
|