-
1
-
-
77958087738
-
Mobile malware - An outlook and a new defense paradigm
-
Mar
-
M. Jakobsson, "Mobile Malware - An Outlook and a New Defense Paradigm," RSA Conf. '10, Mar. 2010.
-
(2010)
RSA Conf. '10
-
-
Jakobsson, M.1
-
2
-
-
0000000447
-
Emerging challenges: Mobile networking for smart dust
-
J. Kahn, R. Katz, and K. Pister, "Emerging Challenges: Mobile Networking for Smart Dust," J. Commun. Net., 2000, pp. 188-196
-
(2000)
J. Commun. Net.
, pp. 188-196
-
-
Kahn, J.1
Katz, R.2
Pister, K.3
-
3
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
May
-
B. Parno, A. Perrig, and V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," IEEE Symp. Security & Privacy, May 2005.
-
(2005)
IEEE Symp. Security & Privacy
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
4
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
J. McCune et al., "Detection of Denial-of-Message Attacks on Sensor Network Broadcasts," IEEE Symp. Security & Privacy, May 2005.
-
(2005)
IEEE Symp. Security & Privacy, May
-
-
McCune, J.1
-
5
-
-
77958095223
-
Location privacy in sensor networks against a global eavesdropper
-
K. Mehta, D. Liu, and M. Wright, "Location Privacy in Sensor Networks against a Global Eavesdropper," IEEE ICNP, 2007.
-
(2007)
IEEE ICNP
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
7
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao et al., "Towards Statistically Strong Source Anonymity for Sensor Networks," IEEE INFOCOM, 2008.
-
(2008)
IEEE INFOCOM
-
-
Shao, M.1
-
8
-
-
33845747795
-
Secure hierarchical in- network aggregation for sensor networks
-
Oct.
-
H. Chan, A. Perrig, and D. Song, "Secure Hierarchical In- Network Aggregation for Sensor Networks," ACM CCS, Oct. 2006.
-
(2006)
ACM CCS
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
34248672225
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor Networks
-
May
-
Y. Yang et al., "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," ACM MobiHoc, May 2006.
-
(2006)
ACM MobiHoc
-
-
Yang, Y.1
-
11
-
-
65249138169
-
New adversary and new threats: Security in unattended sensor networks
-
Mar.
-
D. Ma, C. Soriente, and G. Tsudik, "New Adversary and New Threats: Security in Unattended Sensor Networks," IEEE Network, Mar. 2009.
-
(2009)
IEEE Network
-
-
Ma, D.1
Soriente, C.2
Tsudik, G.3
-
12
-
-
77958113323
-
GossiCrypt: Wireless sensor network data confidentiality against Parasitic Adversaries
-
J. Luo, P. (Panos) Papadimitratos, and J. Hubaux, "GossiCrypt: Wireless Sensor Network Data Confidentiality against Parasitic Adversaries," IEEE SECON, 2008.
-
(2008)
IEEE SECON
-
-
Luo, J.1
Papadimitratos, P.2
Hubaux, J.3
-
13
-
-
35648972648
-
Securing distributed data storage and retrieval in sensor networks
-
N. Subramanian, C. Yang, and W. Zhan, "Securing Distributed Data Storage and Retrieval in Sensor Networks," Pervasive Mobile Comp., vol.3, no.6, 2007, pp. 659-676
-
(2007)
Pervasive Mobile Comp.
, vol.3
, Issue.6
, pp. 659-676
-
-
Subramanian, N.1
Yang, C.2
Zhan, W.3
-
14
-
-
34548302064
-
PDCS: Security and privacy support for data-centric sensor Networks
-
M. Shao et al., "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE INFOCOM, 2007, pp. 1298-1306.
-
(2007)
IEEE INFOCOM
, pp. 1298-1306
-
-
Shao, M.1
-
15
-
-
34548802484
-
Forward-secure sequential aggregate authentication
-
May
-
D. Ma and G. Tsudik, "Forward-Secure Sequential Aggregate Authentication," IEEE Symp. Security & Privacy, May 2007.
-
(2007)
IEEE Symp. Security & Privacy
-
-
Ma, D.1
Tsudik, G.2
-
16
-
-
72749098410
-
Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks
-
A. Yavuz and P. Ning, "Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks," ICST Mobiquitous, 2009.
-
(2009)
ICST Mobiquitous
-
-
Yavuz, A.1
Ning, P.2
-
17
-
-
49149089237
-
Catch me if you can: Data survival in unattended sensor networks
-
R. Di Pietro et al., "Catch Me If You Can: Data Survival in Unattended Sensor Networks," IEEE PerCom, 2008, pp. 185-194
-
(2008)
IEEE PerCom
, pp. 185-194
-
-
Di Pietro, R.1
-
18
-
-
70449419951
-
Data security in unattended sensor networks
-
R. Di Pietro et al., "Data Security in Unattended Sensor Networks," IEEE Trans. Comp., 2009.
-
(2009)
IEEE Trans. Comp.
-
-
Di Pietro, R.1
-
19
-
-
77958104473
-
Maximizing data survival in unattended wireless sensor networks against a focused mobile adversary
-
R. Di Pietro et al., "Maximizing Data Survival in Unattended Wireless Sensor Networks against a Focused Mobile Adversary," Ad Hoc Net. J., 2009.
-
(2009)
Ad Hoc Net. J.
-
-
Di Pietro, R.1
-
20
-
-
77958110931
-
Network coding based dependable and efficient data survival in unattended wireless sensor networks
-
Dec.
-
W. Ren, J. Zhao, and Y. Ren, "Network Coding Based Dependable And Efficient Data Survival in Unattended Wireless Sensor Networks," J. Commun., vol.4, no.11, Dec. 2009, pp. 894-901.
-
(2009)
J. Commun.
, vol.4
, Issue.11
, pp. 894-901
-
-
Ren, W.1
Zhao, J.2
Ren, Y.3
-
21
-
-
58149086240
-
POSH: Proactive co-operative self- healing in unattended sensor networks
-
R. Di Pietro et al., "POSH: Proactive Co-Operative Self- Healing in Unattended Sensor Networks," 27th IEEE SRDS '08, 2008, pp. 185-194
-
(2008)
27th IEEE SRDS '08
, pp. 185-194
-
-
Di Pietro, R.1
-
22
-
-
58049110209
-
DISH: Distributed self-healing in unattended wireless sensor networks
-
D. Ma and G. Tsudik, "DISH: Distributed Self-Healing in Unattended Wireless Sensor Networks," Symp. Stabilization, Safety, & Security Distrib. Sys., 2008, pp. 47-62.
-
(2008)
Symp. Stabilization, Safety, & Security Distrib. Sys.
, pp. 47-62
-
-
Ma, D.1
Tsudik, G.2
-
23
-
-
70349251527
-
Collaborative authentication in unattended WSNs
-
R. Di Pietro et al., "Collaborative Authentication in Unattended WSNs," ACM WiSec '09, 2009.
-
(2009)
ACM WiSec '09
-
-
Di Pietro, R.1
-
24
-
-
77953295155
-
Intrusion-resilience in mobile unattended WSNs
-
R. Di Pietro et al., "Intrusion-Resilience in Mobile Unattended WSNs," IEEE INFOCOM, 2010.
-
(2010)
IEEE INFOCOM
-
-
Di Pietro, R.1
-
25
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
May
-
W. Zhang et al., "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," ACM MobiHoc, May 2005, pp. 378-389
-
(2005)
ACM MobiHoc
, pp. 378-389
-
-
Zhang, W.1
-
26
-
-
70349658629
-
DP2AC: Distributed privacy-preserving access control in sensor networks
-
R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks," IEEE INFOCOM, 2009.
-
(2009)
IEEE INFOCOM
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
28
-
-
84873946697
-
Revisiting smart dust with rfid sensor networks
-
Oct.
-
M. Buettner et al., "Revisiting Smart Dust with RFID Sensor Networks," ACM SIGCOMM HotNets-VII, Oct. 2008.
-
(2008)
ACM SIGCOMM HotNets-VII
-
-
Buettner, M.1
-
29
-
-
68949183472
-
Wireless passive sensor networks
-
Aug.
-
M. Isik and O. Akan, "Wireless Passive Sensor Networks," IEEE Commun. Mag., vol.47, no.89, Aug. 2009, pp. 92-99
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.89
, pp. 92-99
-
-
Isik, M.1
Akan, O.2
-
30
-
-
0032074435
-
Self-powered signal processing using vibration-based power generation
-
R. Amirtharajah and A. Chandrakasan, "Self-Powered Signal Processing Using Vibration-Based Power Generation," IEEE J. Solid-State Circuits, vol.33, 1998, pp. 687-695
-
(1998)
IEEE J. Solid-State Circuits
, vol.33
, pp. 687-695
-
-
Amirtharajah, R.1
Chandrakasan, A.2
-
31
-
-
79953078626
-
Towards autonomously-powered CRFIDs
-
Oct.
-
S. Clark et al., "Towards Autonomously-Powered CRFIDs," HotPower '09, Oct. 2009.
-
(2009)
HotPower '09
-
-
Clark, S.1
-
32
-
-
33744937153
-
Performance aware tasking for environmentally powered sensor networks
-
A. Kansal, D. Potter, and M. Srivastava, "Performance Aware Tasking for Environmentally Powered Sensor Networks," ACM SIGMETRICS '04, 2004.
-
(2004)
ACM SIGMETRICS ' 04
-
-
Kansal, A.1
Potter, D.2
Srivastava, M.3
-
33
-
-
48049122971
-
An environmental energy harvesting framework for sensor networks
-
A. Kansal and M. Srivastava, "An Environmental Energy Harvesting Framework for Sensor Networks," ACM/IEEE ISLPED, 2003.
-
(2003)
ACM/IEEE ISLPED
-
-
Kansal, A.1
Srivastava, M.2
-
35
-
-
33750345292
-
A wirelessly-powered platform for sensing and computation
-
J. Smith et al., "A Wirelessly-Powered Platform for Sensing and Computation," Ubicomp '06, 2006, pp. 495-506.
-
(2006)
Ubicomp ' 06
, pp. 495-506
-
-
Smith, J.1
-
36
-
-
77958105995
-
Wirelessly-charged UHF tags for sensor data collection
-
R. Prasad et al., "Wirelessly-Charged UHF Tags for Sensor Data Collection," IEEE RFID '08, 2008.
-
(2008)
IEEE RFID '08
-
-
Prasad, R.1
-
37
-
-
77950320989
-
CCCP: Secure remote storage for computational RFIDs
-
Aug.
-
M. Salajegheh et al., "CCCP: Secure Remote Storage for Computational RFIDs," 18th USENIX Security Symp., Aug. 2009.
-
(2009)
18th USENIX Security Symp.
-
-
Salajegheh, M.1
-
38
-
-
44649195976
-
Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective
-
F. Bai, T. Elbatt, and G. Hollan, "Towards Characterizing and Classifying Communication-Based Automotive Applications from a Wireless Networking Perspective," IEEE AutoNet, 2006.
-
(2006)
IEEE AutoNet
-
-
Bai, F.1
Elbatt, T.2
Hollan, G.3
-
39
-
-
84890060973
-
Co-operative downloading in vehicular ad-hoc wireless networks
-
A. Nandan et al., "Co-Operative Downloading in Vehicular Ad-Hoc Wireless Networks," WONS '05, 2005.
-
(2005)
WONS ' 05
-
-
Nandan, A.1
-
40
-
-
77958082085
-
First experience with cartorrent in a real vehicular ad hoc network testbed
-
K. Lee et al., "First Experience with CarTorrent in a Real Vehicular Ad Hoc Network Testbed," Move '07, 2007.
-
(2007)
Move ' 07
-
-
Lee, K.1
-
41
-
-
34247340171
-
CodeTorrent: Content distribution using network coding in VANET
-
DOI 10.1145/1161252.1161254, MobiShare 2006 - Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing and Networking
-
U. Lee et al., "Code Torrent: Content Distribution using Network Coding in VANET," Proc. 1st ACM MobiShare '06, 2006, pp. 1-5. (Pubitemid 46634308)
-
(2006)
MobiShare 2006 - Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing and Networking
, vol.2006
, pp. 1-5
-
-
Lee, U.1
Park, J.-S.2
Yeh, J.3
Pau, G.4
Gerla, M.5
-
42
-
-
61449232614
-
Dissemination and harvesting of urban data using vehicular sensor platforms
-
U. Lee et al., "Dissemination and Harvesting of Urban Data using Vehicular Sensor Platforms," IEEE Trans. Vehic. Tech., vol.58, no.2, 2009, pp. 882-901.
-
(2009)
IEEE Trans. Vehic. Tech.
, vol.58
, Issue.2
, pp. 882-901
-
-
Lee, U.1
-
43
-
-
58149190182
-
Bio-inspired multi-agent data harvesting in a proactive urban monitoring environment
-
U. Lee et al., "Bio-Inspired Multi-Agent Data Harvesting in a Proactive Urban Monitoring Environment," Ad Hoc Net. J., vol.7, no.4, 2009.
-
(2009)
Ad Hoc Net. J.
, vol.7
, Issue.4
-
-
Lee, U.1
-
44
-
-
33845565342
-
MobEyes: Smart mobs for urban monitoring with vehicular sensor networks
-
U. Lee et al., "MobEyes: Smart Mobs for Urban Monitoring with Vehicular Sensor Networks," IEEE Wireless Commun., vol.13, no.5, 2006, pp. 51-57.
-
(2006)
IEEE Wireless Commun.
, vol.13
, Issue.5
, pp. 51-57
-
-
Lee, U.1
-
45
-
-
33745963166
-
VITP: An information transfer protocol for vehicular computing
-
M. Dikaiakos et al., "VITP: An Information Transfer Protocol for Vehicular Computing," Proc. 2nd ACM VANET '05, 2005, pp. 30-39.
-
(2005)
Proc. 2nd ACM VANET '05
, pp. 30-39
-
-
Dikaiakos, M.1
-
47
-
-
77951152238
-
Standard specification for telecommunications and information exchange between roadside and vehicle systems 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) specifications
-
ASTM Std. E2213, West Conshohocken, PA
-
ASTM Std. E2213, 2003, "Standard Specification for Telecommunications and Information Exchange between Roadside and Vehicle Systems 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) specifications," ASTM Int'l., West Conshohocken, PA, 2003; http://www.astm.org.
-
(2003)
ASTM int'L.
-
-
-
48
-
-
32144446861
-
Security issues in a future vehicular network
-
Feb.
-
M. El Zarki et al., "Security Issues in a Future Vehicular Network," EuroWireless '02, Feb. 2002.
-
(2002)
EuroWireless '02
-
-
El Zarki, M.1
-
49
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
P. Papadimitratos et al., "Secure Vehicular Communication Systems: Design and Architecture," IEEE Commun. Mag., 2008.
-
(2008)
IEEE Commun. Mag.
-
-
Papadimitratos, P.1
-
53
-
-
74549134073
-
Flexible, extensible, and efficient VANET authentication
-
Dec.
-
A. Studer et al., "Flexible, Extensible, and Efficient VANET Authentication," J. Commun. Net., vol.11, no.6, Dec. 2009, pp. 894-901.
-
(2009)
J. Commun. Net.
, vol.11
, Issue.6
, pp. 894-901
-
-
Studer, A.1
-
54
-
-
48349084433
-
Alarm: Anonymous location-aided routing in suspicious MANETs
-
K. El Defrawy and G. Tsudik, "Alarm: Anonymous Location-Aided Routing in Suspicious MANETs," IEEE ICNP '07, 2007, pp. 304-313
-
(2007)
IEEE ICNP '07
, pp. 304-313
-
-
El Defrawy, K.1
Tsudik, G.2
-
55
-
-
67249139271
-
Prism: Privacy-friendly routing in suspicious MANETs (and VANETs)
-
K. El Defrawy and G. Tsudik, "Prism: Privacy-Friendly Routing in Suspicious MANETs (and VANETs)," IEEE ICNP '08, 2008, pp. 258-267
-
(2008)
IEEE ICNP ' 08
, pp. 258-267
-
-
El Defrawy, K.1
Tsudik, G.2
-
56
-
-
83655189677
-
A group signature based secure and privacy-preserving vehicular communication framework
-
J. Guo, J. Baugh, and S. Wang, "A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework," IEEE INFOCOM, 2007.
-
(2007)
IEEE INFOCOM
-
-
Guo, J.1
Baugh, J.2
Wang, S.3
-
57
-
-
78650728143
-
Tacking together efficient authentication revocation, and privacy in VANETs
-
A. Studer et al., "Tacking together Efficient Authentication Revocation, and Privacy in VANETs," IEEE SECON, 2009.
-
(2009)
IEEE SECON
-
-
Studer, A.1
-
59
-
-
77958098760
-
-
NASA, "NASA DTN Project Page"; http://www.nasa.gov/missionpp./ station/science/experiments/ DTN.htm.
-
NASA DTN Project Page
-
-
-
60
-
-
70349467302
-
Delay-tolerant network technologies coming together
-
G. Goth, "Delay-Tolerant Network Technologies Coming Together," IEEE Distrib. Sys., vol.7, no.8, 2006.
-
(2006)
IEEE Distrib. Sys.
, vol.7
, Issue.8
-
-
Goth, G.1
-
61
-
-
77958095222
-
Application of delay tolerant networking DTN in airborne networks
-
T. Jonson et al., "Application of Delay Tolerant Networking DTN in Airborne Networks," IEEE MILCOM, 2008.
-
(2008)
IEEE MILCOM
-
-
Jonson, T.1
-
62
-
-
51349140660
-
Towards securing disruption-tolerant networking
-
Nokia Research Center
-
N. Asokan et al., "Towards Securing Disruption-Tolerant Networking," tech. rep. NRC-TR2007-07, Nokia Research Center, 2007.
-
(2007)
Tech. Rep. NRC-TR2007-07
-
-
Asokan, N.1
-
63
-
-
4444288136
-
A delay tolerant network architecture for challenged internets
-
K. Fall, "A Delay Tolerant Network Architecture for Challenged Internets," ACM SIGCOMM, 2003.
-
(2003)
ACM SIGCOMM
-
-
Fall, K.1
-
64
-
-
33749041735
-
Keshav, practical security for disconnected nodes
-
S, Nov
-
A. Seth and S, "Keshav, "Practical Security for Disconnected Nodes," IEEE NPSec, Nov. 2005.
-
(2005)
IEEE NPSec
-
-
Seth, A.1
-
66
-
-
77958097103
-
Applicability of identity-based cryptography for disruption-tolerant networking
-
N. Asokan et al., "Applicability of Identity-Based Cryptography for Disruption-Tolerant Networking," ACM MobiOpp, 2007.
-
(2007)
ACM MobiOpp
-
-
Asokan, N.1
-
67
-
-
70249115721
-
Practical security for rural internet kiosks
-
S. Ur Rahman et al., "Practical Security for Rural Internet Kiosks," ACM NSDR '08, 2008, pp. 13-18.
-
(2008)
ACM NSDR '08
, pp. 13-18
-
-
Ur Rahman, S.1
-
68
-
-
70449632776
-
Leveraging social contacts for message confidentiality in delay- tolerant networks
-
K. El Defrawy, J. Solis, and G. Tsudik, "Leveraging Social Contacts for Message Confidentiality in Delay- Tolerant Networks," IEEE COMPSAC, 2009.
-
(2009)
IEEE COMPSAC
-
-
El Defrawy, K.1
Solis, J.2
Tsudik, G.3
|