-
2
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei, "A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks," Proc. ACM MobiHoc, pp. 80-89, 2007.
-
(2007)
Proc. ACM MobiHoc
, pp. 80-89
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
5
-
-
31844450265
-
Public key cryptography in sensor networks-revisited
-
G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public Key Cryptography in Sensor Networks-Revisited," Proc. First European Workshop Security in Ad-Hoc and Sensor Networks (ESAS '04), pp. 2-18, 2004.
-
(2004)
Proc. First European Workshop Security in Ad-Hoc and Sensor Networks (ESAS '04)
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
7
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
B. Karp and H.T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. ACM MobiCom, pp. 243-254, 2000.
-
(2000)
Proc. ACM MobiCom
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
8
-
-
33646921982
-
A new directional flooding protocol for wireless sensor networks
-
Y.-B. Ko, J.-M. Choi, and J.-H. Kim, "A New Directional Flooding Protocol for Wireless Sensor Networks," Proc. Int'l Conf. Information Networking (ICOIN '04), pp. 93-102, 2004.
-
(2004)
Proc. Int'l Conf. Information Networking (ICOIN '04)
, pp. 93-102
-
-
Ko, Y.-B.1
Choi, J.-M.2
Kim, J.-H.3
-
9
-
-
3042704872
-
Efficient flooding with passive clustering (pc) in Ad Hoc networks
-
T.J. Kwon and M. Gerla, "Efficient Flooding with Passive Clustering (PC) in Ad Hoc Networks," ACM SIGCOMM Computer Comm. Rev., vol.32, no.1, pp. 44-56, 2002.
-
(2002)
ACM SIGCOMM Computer Comm. Rev.
, vol.32
, Issue.1
, pp. 44-56
-
-
Kwon, T.J.1
Gerla, M.2
-
10
-
-
0035865898
-
Flooding in wireless Ad Hoc networks
-
H. Lim and C. Kim, "Flooding in Wireless Ad Hoc Networks," Computer Comm., vol.24, nos. 3/4, pp. 353-363, 2000.
-
(2000)
Computer Comm.
, vol.24
, Issue.3-4
, pp. 353-363
-
-
Lim, H.1
Kim, C.2
-
11
-
-
20344381294
-
A public-key infra structure for key distribution in tinyos based on elliptic curve cryptography
-
D.J. Malan, M. Welsh, and M.D. Smith, "A Public-Key Infra structure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," Proc. IEEE Conf. Sensor and Ad Hoc Comm. And Networks (SECON), pp. 71-80, 2004.
-
(2004)
Proc. IEEE Conf. Sensor and Ad Hoc Comm. and Networks (SECON)
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile Ad Hoc networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 255-265, 2000.
-
(2000)
Proc. ACM MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), pp. 259-268, 2004.
-
(2004)
Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
14
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. IEEE Symp. Security and Privacy (S&P '05), pp. 49-63, 2005.
-
(2005)
Proc. IEEE Symp. Security and Privacy (S&P '05)
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
15
-
-
0036983290
-
GHT: A geographic hash table for data-centric storage
-
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, "GHT: A Geographic Hash Table for Data-Centric Storage," Proc. First ACM Int'l Workshop Wireless Sensor Networks and Applications (WSNA), pp. 78-87, 2002.
-
(2002)
Proc. First ACM Int'l Workshop Wireless Sensor Networks and Applications (WSNA)
, pp. 78-87
-
-
Ratnasamy, S.1
Karp, B.2
Yin, L.3
Yu, F.4
Estrin, D.5
Govindan, R.6
Shenker, S.7
-
16
-
-
13244292297
-
Location-aided flooding: An energy-efficient data dissemination protocol for wireless sensor networks
-
Jan.
-
H. Sabbineni and K. Chakrabarty, "Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks," IEEE Trans. Computers, vol.54, no.1, pp. 36-46, Jan. 2005.
-
(2005)
IEEE Trans. Computers
, vol.54
, Issue.1
, pp. 36-46
-
-
Sabbineni, H.1
Chakrabarty, K.2
-
17
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L.V. Doorn, and P. Khosla, "SWATT: SoftWare-Based ATTestation for Embedded Devices," Proc. IEEE Symp. Security and Privacy (S&P '04), pp. 272-282, 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy (S&P '04)
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Doorn, L.V.3
Khosla, P.4
-
18
-
-
48649109631
-
Efficient distributed detection of node replication attacks in sensor networks
-
Computer Security Applications Conf. (ACSAC '07)
-
B. Zhu, V.G.K. Addada, S. Setia, S. Jajodia, and S. Roy, "Efficient Distributed Detection of Node Replication Attacks in Sensor Networks," Proc. 23rd Ann. Computer Security Applications Conf. (ACSAC '07), 2007.
-
(2007)
Proc. 23rd Ann.
-
-
Zhu, B.1
Addada, V.G.K.2
Setia, S.3
Jajodia, S.4
Roy, S.5
|