-
1
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
-
ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
2
-
-
34548302064
-
pDCS: Security and privacy support for data-centric sensor networks
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007, pp. 1298-1306.
-
IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007
, pp. 1298-1306
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
3
-
-
51349098378
-
Verifiable privacy-preserving range query in sensor networks
-
B. Sheng and Q. Li, "Verifiable privacy-preserving range query in sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008, pp. 46-50.
-
IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008
, pp. 46-50
-
-
Sheng, B.1
Li, Q.2
-
4
-
-
70349690087
-
Secure range queries in tiered sensor networks
-
J. Shi, R. Zhang, and Y. Zhang, "Secure range queries in tiered sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
5
-
-
70450207961
-
Secure multidimensional range queries in sensor networks
-
R. Zhang, J. Shi, and Y. Zhang, "Secure multidimensional range queries in sensor networks," in ACM MobiHoc'09, New Orleans, LA, May 2009, pp. 197-206.
-
ACM MobiHoc'09, New Orleans, LA, May 2009
, pp. 197-206
-
-
Zhang, R.1
Shi, J.2
Zhang, Y.3
-
6
-
-
34547484870
-
The tenet architecture for tiered sensor networks
-
O. Gnawali, et al., "The tenet architecture for tiered sensor networks," in SenSys'06, Boulder, Colorado, USA, Oct. 2006, pp. 153-166.
-
SenSys'06, Boulder, Colorado, USA, Oct. 2006
, pp. 153-166
-
-
Gnawali, O.1
-
7
-
-
84905852894
-
TSAR: A two tier sensor storage architecture using interval skip graphs
-
P. Desnoyers, D. Ganesan, and P. Shenoy, "TSAR: A two tier sensor storage architecture using interval skip graphs," in ACM SenSys'05, San Diego, California, USA, Nov. 2005, pp. 39-50.
-
ACM SenSys'05, San Diego, California, USA, Nov. 2005
, pp. 39-50
-
-
Desnoyers, P.1
Ganesan, D.2
Shenoy, P.3
-
8
-
-
33749605102
-
A sampling-based approach to optimizing top-k queries in sensor networks
-
A. S. Silberstein, R. Braynard, C. Ellis, K. Munagala, and J. Yang, "A sampling-based approach to optimizing top-k queries in sensor networks," in ICDE '06, Lisboa, Portuga, Apr. 2006, p. 68.
-
ICDE '06, Lisboa, Portuga, Apr. 2006
, pp. 68
-
-
Silberstein, A.S.1
Braynard, R.2
Ellis, C.3
Munagala, K.4
Yang, J.5
-
9
-
-
35448930647
-
Answering top-k queries using views
-
Sep
-
G. Das, D. Gunopulos, N. Koudas, and D. Tsirogiannis, "Answering top-k queries using views," in VLDB'06, Sep. 2006, pp. 451-462.
-
(2006)
VLDB'06
, pp. 451-462
-
-
Das, G.1
Gunopulos, D.2
Koudas, N.3
Tsirogiannis, D.4
-
10
-
-
49449086367
-
Attack-resistant location estimation in wireless sensor networks
-
July
-
D. Liu, P. Ning, A. Liu, C. Wang, and W. Du, "Attack-resistant location estimation in wireless sensor networks," ACM TISSEC, vol. 11, no. 4, pp. 1-39, July 2008.
-
(2008)
ACM TISSEC
, vol.11
, Issue.4
, pp. 1-39
-
-
Liu, D.1
Ning, P.2
Liu, A.3
Wang, C.4
Du, W.5
-
11
-
-
85000276942
-
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multilevel μTESLA: Broadcast authentication for distributed sensor networks," Trans. on Embedded Computing Sys., vol. 3, no. 4, pp. 800-836, 2004.
-
(2004)
Trans. on Embedded Computing Sys.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
12
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Aug.
-
P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, Aug. 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
13
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, "SWATT: Software-based attestation for embedded devices," in IEEE S&P'04, Berkeley, CA, USA, May 2004, pp. 272-282.
-
IEEE S&P'04, Berkeley, CA, USA, May 2004
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.K.4
-
14
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN'08, St. Louis, MO, Apr. 2008, pp. 245-256.
-
IPSN'08, St. Louis, MO, Apr. 2008
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
|