-
1
-
-
70349122119
-
A ROM-friendly secure code update mechanism for WSNs using a stateful verifier T-time signature scheme
-
Zurich, Switzerland, Mar.
-
O. Ugus, D. Westhoff, and J.-M. Bohli, "A ROM-friendly Secure Code Update Mechanism for WSNs Using a Stateful verifier T-time Signature Scheme," in ACM WiSec, Zurich, Switzerland, Mar. 2009.
-
(2009)
ACM WiSec
-
-
Ugus, O.1
Westhoff, D.2
Bohli, J.-M.3
-
2
-
-
77953965310
-
SYNAPSE++: Code dissemination in wireless sensor networks using fountain codes
-
accepted for publication
-
M. Rossi, N. Bui, G. Zanca, L. Stabellini, R. Crepaldi, and M. Zorzi, "SYNAPSE++: Code Dissemination in Wireless Sensor Networks using Fountain Codes;' Transactions on Mobile Computing, 2010, accepted for publication.
-
(2010)
Transactions on Mobile Computing
-
-
Rossi, M.1
Bui, N.2
Zanca, G.3
Stabellini, L.4
Crepaldi, R.5
Zorzi, M.6
-
3
-
-
85011615501
-
Securing the deluge Network programming system
-
Nashville, TN, USA, Apr.
-
P. K. Dutta, J. W. Hui, D. C. Chu, and D. E. Culler, "Securing the deluge Network programming system," in IEEE IPSN, Nashville, TN, USA, Apr. 2006.
-
(2006)
IEEE IPSN
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
4
-
-
48349114719
-
Sluice: Secure dissemination of code updates in sensor networks
-
Reading, UK, May
-
P. E. Lanigan, R. Gandhi, and P. Narasimhan, "Sluice: Secure Dissemination of Code Updates in Sensor Networks," in IEEE ICDCS, Reading, UK, May 2006.
-
(2006)
IEEE ICDCS
-
-
Lanigan, P.E.1
Gandhi, R.2
Narasimhan, P.3
-
5
-
-
77953985128
-
Secure code distribution in dynamically programmable wireless sensor networks
-
Nashville, TN, USA, Apr.
-
J. Deng, R. Han, and S. Mishra, "Secure code distribution in dynamically programmable wireless sensor networks," in IEEE IPSN, Nashville, TN, USA, Apr. 2006.
-
(2006)
IEEE IPSN
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
6
-
-
84867952995
-
Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks
-
St. Louis, MO, USA, Apr.
-
S. Hyun, P. Ning, A. Liu, and W. Du, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks," in IEEE IPSN, St. Louis, MO, USA, Apr. 2008.
-
(2008)
IEEE IPSN
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
7
-
-
20344393082
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
Baltimore, MD, USA, Nov.
-
J. W. Hui and D. Culler, "The dynamic behavior of a data dissemination protocol for network programming at scale," in ACM SenSys, Baltimore, MD, USA, Nov. 2004.
-
(2004)
ACM SenSys
-
-
Hui, J.W.1
Culler, D.2
-
8
-
-
56749092208
-
Comparison of innovative signature algorithms for WSNs
-
Alexandria, VA, USA, Apr.
-
B. Driessen, A. Poschmann, and C. Paar, "Comparison of innovative signature algorithms for WSNs," in ACM WiSec, Alexandria, VA, USA, Apr. 2008.
-
(2008)
ACM WiSec
-
-
Driessen, B.1
Poschmann, A.2
Paar, C.3
-
9
-
-
85034089478
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor network
-
St. Louis, MO, USA, Apr.
-
A. Liu and P. Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Network," in IEEE IPSN, St. Louis, MO, USA, Apr. 2008.
-
(2008)
IEEE IPSN
-
-
Liu, A.1
Ning, P.2
-
10
-
-
77954004257
-
Exploring symmetric cryptography for secure network reprogramming
-
Toronto, Ontario, Canada, Jun.
-
D. H. Kim, R. Gandhi, and P. Narasimhan, "Exploring Symmetric Cryptography for Secure Network Reprogramming," in IEEE ICDCS, Toronto, Ontario, Canada, Jun. 2007.
-
(2007)
IEEE ICDCS
-
-
Kim, D.H.1
Gandhi, R.2
Narasimhan, P.3
-
11
-
-
77953980981
-
Secure multi-hop network programming with multiple one-way key chains
-
Alexandria, VA, USA, Apr.
-
H. Tan, S. Jha, D. Ostry, J. Zic, and V. Sivaraman, "Secure multi-hop network programming with multiple one-way key chains," in ACM WiSec, Alexandria, VA, USA, Apr. 2008. 581
-
(2008)
ACM WiSec
, pp. 581
-
-
Tan, H.1
Jha, S.2
Ostry, D.3
Zic, J.4
Sivaraman, V.5
-
12
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sep.
-
A. Perrig, R. Szewczyk, J. D. TYgar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol.8, no.5, pp. 521-534, Sep. 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
TYgar, J.D.3
Wen, V.4
Culler, D.E.5
-
13
-
-
56749158656
-
Secure multi-hop network programming with multiple one-way key chains
-
Alexandria, VA, USA, Apr.
-
H. Tan, S. Jha, D. Ostry, J. Zic, and V. Sivaraman, "Secure multi-hop network programming with multiple one-way key chains," in ACM WiSec, Alexandria, VA, USA, Apr. 2008.
-
(2008)
ACM WiSec
-
-
Tan, H.1
Jha, S.2
Ostry, D.3
Zic, J.4
Sivaraman, V.5
-
14
-
-
77953996667
-
Security enhanced multi-hop over the air reprogramming with Fountain Codes
-
Zurich, Switzerland, Oct.
-
J.-M. Bohli, A. Hessler, O. Ugus, and D. Westhoff, "Security enhanced multi-hop over the air reprogramming with Fountain Codes," in IEEE LCN, Zurich, Switzerland, Oct. 2009.
-
(2009)
IEEE LCN
-
-
Bohli, J.-M.1
Hessler, A.2
Ugus, O.3
Westhoff, D.4
-
15
-
-
60349120275
-
SY NAPSE: A network reprogramming protocol for wireless sensor networks using fountain codes
-
San Francisco, CA, US, Jun.
-
M. Rossi, G. Zanca, L. Stabellini, R. Crepaldi, A. F. Harris III, and M. Zorzi, "SY NAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks using Fountain Codes," in IEEE SECON, San Francisco, CA, US, Jun. 2008.
-
(2008)
IEEE SECON
-
-
Rossi, M.1
Zanca, G.2
Stabellini, L.3
Crepaldi, R.4
Harris Iii, A.F.5
Zorzi, M.6
-
16
-
-
84877683889
-
-
Crossbow, [Online] Available
-
Crossbow, "TelosB Mote Platform Datasheet." [Online]. Available: http://www.xbow.com!
-
TelosB Mote Platform Datasheet
-
-
-
17
-
-
34548356697
-
Energy evaluation of software implementations of block ciphers under memory constraints
-
Nice, France, Apr.
-
J. GroBschiidl, S. Tillich, C. Rechberger, M. Hofmann, and M. Medwed, "Energy evaluation of software implementations of block ciphers under memory constraints," in DATE, Nice, France, Apr. 2007.
-
(2007)
DATE
-
-
Grobschiidl, J.1
Tillich, S.2
Rechberger, C.3
Hofmann, M.4
Medwed, M.5
-
18
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Feb.
-
Y. W. Law, J. Doumen, and P. Hartel, "Survey and benchmark of block ciphers for wireless sensor networks;' ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65-93, Feb. 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
19
-
-
77954013124
-
Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks
-
Hyderabad, India, Dec.
-
D. Jinwala, D. Patel, and K. Dasgupta, "Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks," in ICISS, Hyderabad, India, Dec. 2008.
-
(2008)
ICISS
-
-
Jinwala, D.1
Patel, D.2
Dasgupta, K.3
-
20
-
-
4243199653
-
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
-
Palo Alto, CA, USA, Apr.
-
J. Deng, R. Han, and S. Mishra, "A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks;' in IEEE IPSN, Palo Alto, CA, USA, Apr. 2003.
-
(2003)
IEEE IPSN
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
21
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks
-
Montreal, Canada, Aug.
-
G. Guimaraes, E. Souto, D. Sadok, and J. Kelner, "Evaluation of security mechanisms in wireless sensor networks," in SENET, Montreal, Canada, Aug. 2005.
-
(2005)
SENET
-
-
Guimaraes, G.1
Souto, E.2
Sadok, D.3
Kelner, J.4
-
22
-
-
32144459886
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA, Nov.
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks;' in ACM SenSys, Baltimore, MD, USA, Nov. 2004.
-
(2004)
ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
23
-
-
77954017237
-
MiniSec: A secure sensor network communication architecture
-
Cambridge, MA, USA, Apr.
-
M. Luk, G. Mezzour, A. Perrig, and V. D. Gligor, "MiniSec: A Secure Sensor Network Communication Architecture," in IEEE IPSN, Cambridge, MA, USA, Apr. 2007.
-
(2007)
IEEE IPSN
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.D.4
-
26
-
-
77951731744
-
Key recovery attacks of practical complexity on AES variants with Up to 10 rounds
-
A. Biryukov, O. Dunkelman, N. Keller, D. Khovratovich, and A. Shamir, "Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds;' Cryptology ePrint Archive, Report 2009/374, 2009.
-
(2009)
Cryptology EPrint Archive, Report 2009/374
-
-
Biryukov, A.1
Dunkelman, O.2
Keller, N.3
Khovratovich, D.4
Shamir, A.5
-
27
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Dec.
-
M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," Journal of Computer and System Sciences, vol.61, no.3, pp. 362- 399, Dec. 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
28
-
-
78649545500
-
-
ECRY PT, D.SPA.7 Rev. J.0, ICT-2oo7-216676 ECRY PT II
-
ECRY PT, "Yearly Report on Algorithms and Keysizes," D.SPA.7 Rev. J.0, ICT-2oo7-216676 ECRY PT II, 2009.
-
(2009)
Yearly Report on Algorithms and Keysizes
-
-
-
29
-
-
67649600839
-
The wireless sensor networks for city-wide ambient intelligence (W ISE-WAI) project
-
May
-
P. Casari, A. P. Castellani, A. Cenedese, C. Lora, M. Rossi, L. Schenato, and M. Zorzi, 'The Wireless Sensor Networks for City-Wide Ambient Intelligence (W ISE-WAI) Project," Sensors, vol. 9, no. 6, May 2009.
-
(2009)
Sensors
, vol.9
, Issue.6
-
-
Casari, P.1
Castellani, A.P.2
Cenedese, A.3
Lora, C.4
Rossi, M.5
Schenato, L.6
Zorzi, M.7
|