-
2
-
-
20844436880
-
MANTIS OS: An embedded multithreaded operating system for wireless micro sensor platforms
-
BHATTI, S., CARLSON, J., DAI, H., DENG, J., ROSE, J., SHETH, A., SHUCKER, B., GRUENWALD, C., TORGERSON, A., AND HAN, R. 2005. MANTIS OS: An embedded multithreaded operating system for wireless micro sensor platforms. Mob. Netw. Appl. 10, 4, 563-579.
-
(2005)
Mob. Netw. Appl.
, vol.10
, Issue.4
, pp. 563-579
-
-
Bhatti, S.1
Carlson, J.2
Dai, H.3
Deng, J.4
Rose, J.5
Sheth, A.6
Shucker, B.7
Gruenwald, C.8
Torgerson, A.9
Han, R.10
-
3
-
-
34247397108
-
Secure code distribution in dynamically programmable wireless sensor networks
-
ACM, New York, NY
-
DENG, J., HAN, R., AND MISHRA, S. 2006. Secure code distribution in dynamically programmable wireless sensor networks. In Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN). ACM, New York, NY, 292-300.
-
(2006)
Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 292-300
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
4
-
-
77954812422
-
Design and deployment of a remote robust sensor network: Experiences from an outdoor water quality monitoring network
-
Oct, In
-
DINH, T. L., HU, W., SIKKA, P., CORKE, P., OVERS, L., AND BROSNAN, S. Oct. 2007. Design and deployment of a remote robust sensor network: Experiences from an outdoor water quality monitoring network. In Proceedings of the 2nd IEEE Workshop on Practical Issues in Building Sensor Network Applications (SenseApp).
-
(2007)
Proceedings of the 2nd IEEE Workshop on Practical Issues in Building Sensor Network Applications (SenseApp)
-
-
Dinh, T.L.1
Hu, W.2
Sikka, P.3
Corke, P.4
Overs, L.5
Brosnan, S.6
-
5
-
-
34247376029
-
Securing the deluge network programming system
-
ACM, New York, NY
-
DUTTA, P. K., HUI, J. W., CHU, D. C., AND CULLER, D. E. 2006. Securing the deluge network programming system. In Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN). ACM, New York, NY, 326-333.
-
(2006)
Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
6
-
-
70349278622
-
Code injection attacks on harvard-architecture devices
-
ACM, New York, NY
-
FRANCILLON, A. AND CASTELLUCCIA, C. 2008. Code injection attacks on harvard-architecture devices. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS). ACM, New York, NY, 15-26.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS)
, pp. 15-26
-
-
Francillon, A.1
Castelluccia, C.2
-
7
-
-
0031351746
-
New directions in cryptography: Twenty some years later (or cryptograpy and complexity theory: a match made in heaven)
-
IEEE Computer Society Press, Los Alamitos, CA
-
GOLDWASSER, S. 1997. New directions in cryptography: Twenty some years later (or cryptograpy and complexity theory: a match made in heaven). In Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society Press, Los Alamitos, CA, 314.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 314
-
-
Goldwasser, S.1
-
8
-
-
77956131733
-
Exploiting wireless sensor networks over 802.15.4
-
GOODSPEED, T. 2007. Exploiting wireless sensor networks over 802.15.4. In Proceedings of Toor-Conq.
-
(2007)
Proceedings of Toor-Conq
-
-
Goodspeed, T.1
-
9
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUS
-
Springer, Berlin, Germany
-
GURN, N., PATEL, A., WANDER, A., EBERLE, H., AND SHANTZ, S. C. 2004. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUS. Lecture Notes in Computer Science vol. 3156. Springer, Berlin, Germany, 119-132.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 119-132
-
-
Gurn, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
10
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
University of Colorado at Boulder. Boulder, CO
-
HARTUNG, C., BALASALLE, J., AND HAN, R. 2005. Node compromise in sensor networks: The need for secure systems. Tech. rep. University of Colorado at Boulder. Boulder, CO.
-
(2005)
Tech. Rep.
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
11
-
-
85034631664
-
On using RSA with low exponent in a public key network
-
Lecture Notes in Computer Science, Springer-Verlag, New York, NY
-
HASTAD, J. 1986. On using RSA with low exponent in a public key network. In Proceedings of the Advances in cryptology-(CRYPTO'85). Lecture Notes in Computer Science, vol. 218 Springer-Verlag, New York, NY, 403-408.
-
(1986)
Proceedings of the Advances in Cryptology-(CRYPTO'85)
, vol.218
, pp. 403-408
-
-
Hastad, J.1
-
12
-
-
0036870095
-
Mica: A wireless platform for deeply embedded networks
-
HILL, J. AND CULLER, D. 2002. Mica: A wireless platform for deeply embedded networks. IEEE Micro 22, 6, 12-24.
-
(2002)
IEEE Micro
, vol.22
, Issue.6
, pp. 12-24
-
-
Hill, J.1
Culler, D.2
-
13
-
-
37849027369
-
A hybrid sensor network for cane-toad monitoring
-
ACM Press, New York, NY
-
HU, W., BULUSU, N., CHOU, C. T., JHA, S., TAYLOR, A., AND TRAN, V. N. 2005. A hybrid sensor network for cane-toad monitoring. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys). ACM Press, New York, NY, 305-305.
-
(2005)
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys)
, pp. 305-305
-
-
Hu, W.1
Bulusu, N.2
Chou, C.T.3
Jha, S.4
Taylor, A.5
Tran, V.N.6
-
14
-
-
78049413781
-
SecFleck: A public key technology platform for wireless sensor networks
-
HU, W., CORKE, P., SHIH, W. C., AND OVERS, L. 2009. secFleck: A public key technology platform for wireless sensor networks. In Proceedings of the 6th European Conference on Wireless Sensor Networks (EWSN).
-
(2009)
Proceedings of the 6th European Conference on Wireless Sensor Networks (EWSN)
-
-
Hu, W.1
Corke, P.2
Shih, W.C.3
Overs, L.4
-
15
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
ACM Press, New York, NY
-
HUI, J. W. AND CULLER, D. 2004. The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd International Conference on Embedded Networked Sensor (SenSys). ACM Press, New York, NY, 81-94.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor (SenSys)
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
16
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
ACM Press, New York, NY
-
KARLOF, C., SASTRY, N., AND WAGNER, D. 2004. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys). ACM Press, New York, NY, 162-175.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
17
-
-
84895207016
-
TinyOS: An operating system for sensor networks
-
LEVIS, P., MADDEN, S., POLASTRE, J., SZEWCZYK, R., WHITEHOUSE, K., WOO, A., GAY, D., HILL, J., WELSH, M., BREWER, E., AND CULLER, D. 2005. TinyOS: An operating system for sensor networks. Ambient Intell., 115-148.
-
(2005)
Ambient Intell.
, pp. 115-148
-
-
Levis, P.1
Madden, S.2
Polastre, J.3
Szewczyk, R.4
Whitehouse, K.5
Woo, A.6
Gay, D.7
Hill, J.8
Welsh, M.9
Brewer, E.10
Culler, D.11
-
18
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
IEEE Computer Society Press, Los Alamitos, CA
-
LIU, A. AND NING, P. 2008. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN). IEEE Computer Society Press, Los Alamitos, CA, 245-256.
-
(2008)
Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
19
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
ACM Press, New York, NY
-
LUK, M., MEZZOUR, G., PERRIG, A., AND GLIGOR, V. 2007. MiniSec: a secure sensor network communication architecture. In Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN). ACM Press, New York, NY, 479-488.
-
(2007)
Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
20
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
ACM Press, New York, NY
-
MAINWARING, A., CULLER, D., POLASTRE, J., SZEWCZYK, R., AND ANDERSON, J. 2002. Wireless sensor networks for habitat monitoring. In Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA). ACM Press, New York, NY, 88-97.
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA)
, pp. 88-97
-
-
Mainwaring, A.1
Culler, D.2
Polastre, J.3
Szewczyk, R.4
Anderson, J.5
-
21
-
-
15744395962
-
TEA extensions
-
University of Cambridge, Cambridge, UK
-
NEEDHAM, R. AND WHEELER, D. 1997. TEA extensions. Tech. rep., University of Cambridge, Cambridge, UK.
-
(1997)
Tech. rep.
-
-
Needham, R.1
Wheeler, D.2
-
22
-
-
56749175324
-
Key management and secure software updates in wireless process control environments
-
ACM Press, New York, NY
-
NILSSON, D. K., ROOSTA, T., LINDQVIST, U., AND VALDES, A. 2008. Key management and secure software updates in wireless process control environments. In Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec). ACM Press, New York, NY, 100-108.
-
(2008)
Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec)
, pp. 100-108
-
-
Nilsson, D.K.1
Roosta, T.2
Lindqvist, U.3
Valdes, A.4
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2, 120-126.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
24
-
-
45849124595
-
SAKE: Software attestation for key establishment in sensor networks
-
Springer-Verlag, Berlin, Heidelberg, Germany
-
SESHADRI, A., LUK, M., AND PERRIG, A. 2008. SAKE: Software attestation for key establishment in sensor networks. In Proceedings of the 4th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS). Springer-Verlag, Berlin, Heidelberg, Germany, 372-385.
-
(2008)
Proceedings of the 4th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
, pp. 372-385
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
-
25
-
-
34247361254
-
SCUBA: Secure code update by attestation in sensor networks
-
ACM Press, New York, NY
-
SESHADRI, A., LUK, M., PERRIG, A., VAN DOORN, L., AND KHOSLA, P. 2006. SCUBA: Secure code update by attestation in sensor networks. In Proceedings of the 5th ACM Workshop on Wireless Security (WiSec). ACM Press, New York, NY, 85-94.
-
(2006)
Proceedings of the 5th ACM Workshop on Wireless Security (WiSec)
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
26
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
SESHADRI, A., PERRIG, A., VAN DOORN, L., AND KHOSLA, P. 2004. SWATT: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy. 272-282.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
27
-
-
20844460401
-
On the cost of factoring RSA-1024
-
SHAMIR, A. AND TROMER, E. 2003. On the cost of factoring RSA-1024. RSA CrytoBytes. 6, 2.
-
(2003)
RSA CrytoBytes
, vol.6
, Issue.2
-
-
Shamir, A.1
Tromer, E.2
-
28
-
-
33745736071
-
Remote software-based attestation for wireless sensors
-
SHANECK, M., MAHADEVAN, K., KHER, V., AND KIM, Y. 2005. Remote software-based attestation for wireless sensors. In Proceedings of the ESAS. 27-41.
-
(2005)
Proceedings of the ESAS
, pp. 27-41
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
30
-
-
4243114087
-
Habitat monitoring with sensor networks
-
SZEWCZYK, R., OSTERWEIL, E., POLASTRE, J., HAMILTON, M., MAINWARING, A., AND ESTRIN, D. 2004. Habitat monitoring with sensor networks. Comm. ACM 47, 6, 34-40.
-
(2004)
Comm. ACM
, vol.47
, Issue.6
, pp. 34-40
-
-
Szewczyk, R.1
Osterweil, E.2
Polastre, J.3
Hamilton, M.4
Mainwaring, A.5
Estrin, D.6
-
31
-
-
56749158656
-
Secure multi-hop network programming with multiple one-way key chains
-
ACM Press, New York, NY
-
TAN, H., JHA, S., OSTRY, D., ZIC, J., AND SIVARAMAN, V. 2008. Secure multi-hop network programming with multiple one-way key chains. In Proceedings of the first ACM Conference on Wireless Network Security (WiSec). ACM Press, New York, NY, 183-193.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security (WiSec)
, pp. 183-193
-
-
Tan, H.1
Jha, S.2
Ostry, D.3
Zic, J.4
Sivaraman, V.5
-
32
-
-
21644486314
-
TCG specification architecture overview
-
T CG, Trust Computing Group. Trusted Computer Group, Beaventon, OR
-
T CG. 2007. TCG specification architecture overview. Tech. rep. Trust Computing Group. Trusted Computer Group, Beaventon, OR.
-
(2007)
Tech. Rep.
-
-
-
33
-
-
35348818677
-
The design and evaluation of a mobile Sensor/actuator network for autonomous animal control
-
ACM Press, New York, NY
-
WARK, T., CROSSMAN, C., HU, W., GUO, Y., VALENCIA, P., SIKKA, P., CORKE, P., LEE, C., HENSHALL, J., PRAYAGA, K., O'GRADY, J., REED, M., AND FISHER, A. 2007. The design and evaluation of a mobile Sensor/actuator network for autonomous animal control. In Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN). ACM Press, New York, NY, 206-215.
-
(2007)
Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 206-215
-
-
Wark, T.1
Crossman, C.2
Hu, W.3
Guo, Y.4
Valencia, P.5
Sikka, P.6
Corke, P.7
Lee, C.8
Henshall, J.9
Prayaga, K.10
O'Grady, J.11
Reed, M.12
Fisher, A.13
-
34
-
-
14844304757
-
TinyPK: Securing Sensor networks with public key technology
-
ACM Press, New York, NY
-
WATRO, R., KONG, D., FEN CUTI, S., GARDINER, C., LYNN, C., AND KRUUS, P. 2004. TinyPK: Securing Sensor networks with public key technology. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). ACM Press, New York, NY, 59-64.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, F.S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
|