-
2
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53-57 (2004)
-
(2004)
Communications of the ACM
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
4
-
-
84969346266
-
A certified digital signature
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.1
-
6
-
-
33748089962
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: MobiHoc 2006: Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing (2006)
-
(2006)
MobiHoc 2006: Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
7
-
-
38149043296
-
A secure data aggregation scheme for wireless sensor networks
-
Ren, S.Q., Kim, D.S., Park, J.S.: A Secure Data Aggregation Scheme for Wireless sensor Networks. In: ISPA Workshops 2007, pp. 32-40 (2007)
-
(2007)
ISPA Workshops 2007
, pp. 32-40
-
-
Ren, S.Q.1
Kim, D.S.2
Park, J.S.3
-
8
-
-
51849137350
-
An efficient and verifiable concealed data aggregation scheme in wireless sensor networks
-
Sun, H.-M., Hsiao, Y.-C., Lin, Y.-H., Chen, C.-M.: An Efficient and Verifiable concealed Data Aggregation Scheme in Wireless Sensor Networks. In: Proceedings of the 2008 International Conference on Embedded Software and Systems, pp. 19-26 (2008)
-
(2008)
Proceedings of the 2008 International Conference on Embedded Software and Systems
, pp. 19-26
-
-
Sun, H.-M.1
Hsiao, Y.-C.2
Lin, Y.-H.3
Chen, C.-M.4
-
9
-
-
33744499939
-
Secure comparison of encrypted data in wireless sensor networks
-
Acharya, M., Girao, J., Westhoff, D.: Secure Comparison of Encrypted Data in Wireless sensor Networks. In: Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pp. 47-53 (2005)
-
(2005)
Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
, pp. 47-53
-
-
Acharya, M.1
Girao, J.2
Westhoff, D.3
-
10
-
-
4143140890
-
A survey of two signature aggregation techniques
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: A Survey of Two Signature Aggregation Techniques. In: Cryptobytes 2003 (2003)
-
(2003)
Cryptobytes 2003
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
11
-
-
77649277840
-
Secure and trusted in-network data processing in wireless sensor networks: A survey
-
Sorniotti, A., Gomez, L., Wrona, K., Odorico, L.: Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey. Journal of Information Assurance and Security 2, 189-199 (2007)
-
(2007)
Journal of Information Assurance and Security
, vol.2
, pp. 189-199
-
-
Sorniotti, A.1
Gomez, L.2
Wrona, K.3
Odorico, L.4
-
12
-
-
84994296501
-
The impact of data aggregation in wireless sensor networks
-
Krishnamachari, B., Estrin, D., Wicker, S.B.: The Impact of Data Aggregation in Wireless Sensor Networks. In: 22nd International Conference on Distributed Computing Systems Workshops, ICDCSW (2002)
-
(2002)
22nd International Conference on Distributed Computing Systems Workshops, ICDCSW
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.B.3
-
13
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
doi:10.1016/j.comnet.2009.02.023
-
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. In: Computer Networks (2009), doi:10.1016/j.comnet.2009.02.023
-
(2009)
Computer Networks
-
-
Ozdemir, S.1
Xiao, Y.2
-
14
-
-
33845747795
-
A secure hierarchical in-network aggregation in sensor networks
-
Chan, H., Perrig, A., Song, D.: A Secure Hierarchical In-network Aggregation in Sensor Networks. In: CCS 2006 (2006)
-
(2006)
CCS 2006
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
15
-
-
34347219150
-
Structure-free data aggregation in sensor networks
-
Fan, K.-W., Liu, S., Sinha, P.: Structure-Free Data Aggregation in Sensor Networks. IEEE Transactions on Mobile Computing 6, 929-942 (2007)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, pp. 929-942
-
-
Fan, K.-W.1
Liu, S.2
Sinha, P.3
-
16
-
-
0036766616
-
Data gathering algorithms in sensor networks using energy metrics
-
Lindsey, S., Raghavendra, C., Sivalingam, K.M.: Data Gathering Algorithms in Sensor Networks using Energy Metrics. IEEE Transactions on Parallel Distributed Systems 13, 924-935 (2002)
-
(2002)
IEEE Transactions on Parallel Distributed Systems
, vol.13
, pp. 924-935
-
-
Lindsey, S.1
Raghavendra, C.2
Sivalingam, K.M.3
-
17
-
-
1542280027
-
Query processing for sensor networks
-
Yao, Y., Gehrke, J.: Query Processing for Sensor Networks. In: ACM CIDR (2003)
-
(2003)
ACM CIDR
-
-
Yao, Y.1
Gehrke, J.2
-
18
-
-
33646589837
-
An application specific protocol architecture for wireless microsensor networks
-
Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An Application Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Transactions on Wireless Coomunication 1, 660-670 (2002)
-
(2002)
IEEE Transactions on Wireless Coomunication
, vol.1
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
19
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006 (2006)
-
(2006)
Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
21
-
-
50849086123
-
Wireless sensor networks for battlefield surveillance
-
Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon, N., Bessell, T., Rutten, M., Jha, S.: Wireless Sensor Networks for Battlefield Surveillance. In: Proceedings of the Land Warfare Conference, LWC (2006)
-
(2006)
Proceedings of the Land Warfare Conference, LWC
-
-
Bokareva, T.1
Hu, W.2
Kanhere, S.3
Ristic, B.4
Gordon, N.5
Bessell, T.6
Rutten, M.7
Jha, S.8
-
22
-
-
35048871887
-
Using secret sharing for searching in encrypted data
-
Jonker, W., Petkovi, M. (eds.) SDM 2004. Springer, Heidelberg
-
Jonker, W., Petkovic, M.: Using secret sharing for searching in encrypted data. In: Jonker, W., Petkovi, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 18-27. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3178
, pp. 18-27
-
-
Jonker, W.1
Petkovic, M.2
-
24
-
-
43849098907
-
A trust based framework for secure data aggregation in wireless sensor networks
-
Zhang, W., Das, S.K., Liu, Y.: A trust based framework for secure data aggregation in wireless sensor networks. In: IEEE SECON 2006 proceedings (2006)
-
(2006)
IEEE SECON 2006 Proceedings
-
-
Zhang, W.1
Das, S.K.2
Liu, Y.3
-
25
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
44149083595
-
SBK: A self-configuring framework for bootstrapping keys in sensor networks
-
July
-
Liu, F., Cheng, X., Ma, L., Xing, K.: SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks. IEEE Transactions on Mobile Computing (July 2008)
-
(2008)
IEEE Transactions on Mobile Computing
-
-
Liu, F.1
Cheng, X.2
Ma, L.3
Xing, K.4
-
28
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. In: MobiQuitous 2005 (2005)
-
(2005)
MobiQuitous 2005
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
31
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
32
-
-
27644505653
-
Lightweight key management in wireless sensornetworks by leveraging initial trust
-
System Design Laboratory
-
Dutertre, B., Cheung, S., Levy, J.: Lightweight key management in wireless sensornetworks by leveraging initial trust. T.R SRI-SDL-04-02, System Design Laboratory (2004)
-
(2004)
T.R SRI-SDL-04-02
-
-
Dutertre, B.1
Cheung, S.2
Levy, J.3
-
33
-
-
85028765277
-
Perfectlysecure key distribution for dynamic conferences
-
Brickell E.F. (ed.) CRYPTO 1992. . Springer, Heidelberg
-
Blundo, C., Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectlysecure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO1992. LNCS, vol. 740, pp. 471-486. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
35
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Pervasive Computing and Communications, PerCom 2005 (2005)
-
(2005)
Pervasive Computing and Communications, PerCom 2005
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
|