-
1
-
-
36049018732
-
Perfect forward secrecy of authentication and key exchange protocols in three versions of WAPI
-
Cao, C.J., C. Yang, X.H. Li, Y.B. Guo and J.F. Ma, 2007. Perfect forward secrecy of authentication and key exchange protocols in three versions of WAPI. Inform. Technol. J., 6: 1108-1113.
-
(2007)
Inform. Technol. J.
, vol.6
, pp. 1108-1113
-
-
Cao, C.J.1
Yang, C.2
Li, X.H.3
Guo, Y.B.4
Ma, J.F.5
-
2
-
-
33646569251
-
A topology discovery algorithm for sensor networks with applications to network management
-
September 2002, Pasadena, USA.
-
Deb, B., S. Bhatnagar and B. Nath, 2002. A topology discovery algorithm for sensor networks with applications to network management. Proceedings of the IEEE CAS Workshop on Wireless Communications and Networking, September 2002, Pasadena, USA., pp: 1-4.
-
(2002)
Proceedings of the IEEE CAS Workshop on Wireless Communications and Networking
, pp. 1-4
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
3
-
-
84944414611
-
ReInForM: Reliable information forwarding using multiple paths in sensor networks
-
Oct. 20-24, Germany
-
Deb, B., S. Bhatnagar and B. Nath, 2003. ReInForM: Reliable information forwarding using multiple paths in sensor networks. Proceedings of the 28th Annual IEEE Conference on Local Computer Network, Oct. 20-24, Germany, pp: 406-406.
-
(2003)
Proceedings of the 28th Annual IEEE Conference on Local Computer Network
, pp. 406-406
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
4
-
-
33745969132
-
Defending against path-based DoS attacks in wireless sensor networks
-
Nov. 7, Alexandria
-
Deng, J., R. Han and S. Mishra, 2005. Defending against path-based DoS attacks in wireless sensor networks. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Nov. 7, Alexandria, pp: 89-96.
-
(2005)
Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 89-96
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
0022489112
-
Transmission range control in multi-hop packet radio networks
-
Hou, T.C. and V. Li, 1986. Transmission range control in multi-hop packet radio networks. IEEE. Trans. Commun., 34: 38-44.
-
(1986)
IEEE. Trans. Commun.
, Issue.34
, pp. 38-44
-
-
Hou, T.C.1
Li, V.2
-
9
-
-
0002832952
-
Optimum transmission radii for packet radio networks or why six is a magic number
-
December 1978, Piscataway, N.J., Institute of Electrical and Electronics Engineers, Inc.
-
Kleinrock, L. and J. Silvester, 1978. Optimum transmission radii for packet radio networks or why six is a magic number. Proceedings of the IEEE Telecommunication National Conferance, December 1978, Piscataway, N.J., Institute of Electrical and Electronics Engineers, Inc., pp: 04.3.1-04.3.5.
-
(1978)
Proceedings of the IEEE Telecommunication National Conferance
, pp. 0431-0435
-
-
Kleinrock, L.1
Silvester, J.2
-
10
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Nov. 18-22, ACM Press, Washington, DC. USA.
-
Laurent, E. and V.D. Gligor, 2002. A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov. 18-22, ACM Press, Washington, DC. USA., pp: 41-47.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Laurent, E.1
Gligor, V.D.2
-
12
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
Feb. 6-7, San Diego, CA.
-
Liu, D. and P. Ning, 2003. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. Proceedings of the 10th Annual Network and Distributed System Security Symposium, Feb. 6-7, San Diego, CA., pp: 1-14.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
, pp. 1-14
-
-
Liu, D.1
Ning, P.2
-
13
-
-
0036738266
-
SPINS: Security protocols for sensor netowrks
-
Perrig, A., R. Szewczyk, J.D. Tygar, V. Wen and D.E. Culler, 2002. SPINS: Security protocols for sensor netowrks. Wireless Networks, 8: 521-534.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
14
-
-
0001826463
-
The RC5 encryption algorithm
-
Dec. 14-16, Leuven, Belgium
-
Rivest, R.L., 1994. The RC5 encryption algorithm. Proceedings of the 2nd International Workshop on Fast Software Encryption (FSE), Dec. 14-16, Leuven, Belgium, pp : 86-96.
-
(1994)
Proceedings of the 2nd International Workshop on Fast Software Encryption (FSE)
, pp. 86-96
-
-
Rivest, R.L.1
-
15
-
-
0021386815
-
Optimal transmission ranges for randomly distributed packet radio terminals
-
Takagi, H. and L. Kleinrock, 1984. Optimal transmission ranges for randomly distributed packet radio terminals. IEEE. Trans. Commun., 32: 246-257.
-
(1984)
IEEE. Trans. Commun.
, vol.32
, pp. 246-257
-
-
Takagi, H.1
Kleinrock, L.2
-
16
-
-
56749158656
-
Secure multi-hop network programming with multiple one-way key chains
-
March 31 -April 2, Alexandria
-
Tany, H., S. Jha, D. Ostryz, J. Zic and V. Sivaraman, 2008. Secure multi-hop network programming with multiple one-way key chains. Proceedings of the 1ST ACM Conference on Wireless Network Security (WISEC), March 31 -April 2, Alexandria, pp: 183-193.
-
(2008)
Proceedings of the 1ST ACM Conference on Wireless Network Security (WISEC)
, pp. 183-193
-
-
Tany, H.1
Jha, S.2
Ostryz, D.3
Zic, J.4
Sivaraman, V.5
-
17
-
-
33644928040
-
Connected dominating sets in disk graphs with bidirectional links
-
Thai, T. and D.Z. Du, 2006. Connected dominating sets in disk graphs with bidirectional links. IEEE. Commun. Lett., 10: 138-140.
-
(2006)
IEEE. Commun. Lett.
, vol.10
, pp. 138-140
-
-
Thai, T.1
Du, D.Z.2
-
18
-
-
67651034136
-
DOSM: A data-oriented security model based on information hiding in WSNs
-
Xiao, X., X. Sun, X. Wang and L. Rao, 2009. DOSM: A data-oriented security model based on information hiding in WSNs. Inform. Technol. J., 8: 678-687.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 678-687
-
-
Xiao, X.1
Sun, X.2
Wang, X.3
Rao, L.4
-
19
-
-
0034772133
-
Geography-informed energy conservation for ad hoc routing
-
July 16-21, Rome, Italy
-
Xu, Y., J. Heidemann and D. Estrin, 2001. Geography-informed energy conservation for ad hoc routing. Proceedings of the ACM International Conference on Mobile Computing and Networking, July 16-21, Rome, Italy, pp: 70-84.
-
(2001)
Proceedings of the ACM International Conference on Mobile Computing and Networking
, pp. 70-84
-
-
Xu, Y.1
Heidemann, J.2
Estrin, D.3
-
20
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
March 7-11, Hongkong, China
-
Ye, F., H. Luo, S. Lu and L. Zhang, 2004. Statistical en-route filtering of injected false data in sensor networks. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), March 7-11, Hongkong, China, pp: 2446-2457.
-
(2004)
Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 2446-2457
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
|