-
3
-
-
0034229404
-
Network information flow
-
Ahlswede R., Cai N., Li S.-Y. R., Yeung R. W., Network information flow IEEE Transactions on Information Theory 2000 46 4 1204 1216
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
14
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
article 1
-
Ning P., Liu A., Du W., Mitigating DoS attacks against broadcast authentication in wireless sensor networks ACM Transactions on Sensor Networks 2008 4 1, article 1
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.1
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
17
-
-
33749604819
-
Authenticated in-network programming for wireless sensor networks
-
Lecture Notes in Computer Science
-
Krontiris I., Dimitriou T., Authenticated in-network programming for wireless sensor networks Ad Hoc Mobile Wireless Networks 2006 4104 390 403 Lecture Notes in Computer Science
-
(2006)
Ad Hoc Mobile Wireless Networks
, vol.4104
, pp. 390-403
-
-
Krontiris, I.1
Dimitriou, T.2
-
19
-
-
77953965310
-
SYNAPSE++: Code dissemination in wireless sensor networks using fountain codes
-
In press
-
Rossi M., Bui N., Zanca G., Stabellini L., Crepaldi R., Zorzi M., SYNAPSE++: code dissemination in wireless sensor networks using fountain codes. IEEE Transactions on Mobile Computing. In press
-
IEEE Transactions on Mobile Computing
-
-
Rossi, M.1
Bui, N.2
Zanca, G.3
Stabellini, L.4
Crepaldi, R.5
Zorzi, M.6
-
20
-
-
56749158656
-
Secure multi-hop network programming with multiple one-way key chains
-
April ACM
-
Tan H., Jha S., Ostry D., Zic J., Sivaraman V., Secure multi-hop network programming with multiple one-way key chains Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08) April 2008 ACM 183 193
-
(2008)
Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08)
, pp. 183-193
-
-
Tan, H.1
Jha, S.2
Ostry, D.3
Zic, J.4
Sivaraman, V.5
-
21
-
-
58049131230
-
Secure and DoS-resistant network reprogramming in sensor networks based on CPK
-
October
-
Zhang Y., Zhou X.-S., Ji Y.-M., Fang Z.-Y., Wang L.-F., Secure and DoS-resistant network reprogramming in sensor networks based on CPK Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08) October 2008 1 5
-
(2008)
Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08)
, pp. 1-5
-
-
Zhang, Y.1
Zhou, X.-S.2
Ji, Y.-M.3
Fang, Z.-Y.4
Wang, L.-F.5
-
22
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu S., Setia S., Jajodia S., LEAP+: efficient security mechanisms for large-scale distributed sensor networks ACM Transactions on Sensor Networks 2006 2 4 500 528
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
23
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
amtepe S. A., Yener B., Combinatorial design of key distribution mechanisms for wireless sensor networks IEEE/ACM Transactions on Networking 2007 15 2 346 358
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.2
, pp. 346-358
-
-
Amtepe, S.A.1
Yener, B.2
-
26
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
DOI 10.1145/1065545.1065548
-
Du W., Deng J., Han Y. S., Varshney P. K., Katz J., Khalili A., A pairwise key predistribution scheme for wireless sensor networks ACM Transactions on Information and System Security 2005 8 2 228 258 (Pubitemid 41092672)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
30
-
-
34548349361
-
Resilient network coding in the presence of Byzantine adversaries
-
May IEEE
-
Jaggi S., Langberg M., Katti S., Ho T., Katabi D., Mdard M., Resilient network coding in the presence of Byzantine adversaries Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07) May 2007 IEEE 616 624
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07)
, pp. 616-624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Mdard, M.6
-
32
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
July IEEE
-
Ho T., Leong B., Koetter R., Mdard M., Effros M., Karger D. R., Byzantine modification detection in multicast networks using randomized network coding Proceedings of the IEEE International Symposium on Information Theory (ISIT '04) July 2004 IEEE 144
-
(2004)
Proceedings of the IEEE International Symposium on Information Theory (ISIT '04)
, pp. 144
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Mdard, M.4
Effros, M.5
Karger, D.R.6
-
41
-
-
69249229584
-
Secure network coding for wireless mesh networks: Threats, challenges, and directions
-
Dong J., Curtmola R., Nita-Rotaru C., Secure network coding for wireless mesh networks: threats, challenges, and directions Computer Communications 2009 32 17 1790 1801
-
(2009)
Computer Communications
, vol.32
, Issue.17
, pp. 1790-1801
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
42
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July ACM
-
Perrig A., Szewczyk R., Wen V., Culler D., Tygar J. D., SPINS: security protocols for sensor networks Proceedings of the 7th Annual International Conference on Mobile Computing and Networking July 2001 ACM 189 199
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
44
-
-
51749123573
-
SYNAPSE: A network reprogramming protocol for wireless sensor networks using fountain codes
-
June
-
Rossis M., Zancas G., Stabellini L., Crepaldi R., Harris A. F. III, Zorzi M., SYNAPSE: a network reprogramming protocol for wireless sensor networks using fountain codes Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '08) June 2008 188 196
-
(2008)
Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '08)
, pp. 188-196
-
-
Rossis, M.1
Zancas, G.2
Stabellini, L.3
Crepaldi, R.4
Harris III, A.F.5
Zorzi, M.6
-
47
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
article 15
-
Ganeriwal S., Balzano L. K., Srivastava M. B., Reputation-based framework for high integrity sensor networks ACM Transactions on Sensor Networks 2008 4 3, article 15 1 37
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
49
-
-
77950866308
-
Trust management systems for wireless sensor networks: Best practices
-
Lopez J., Roman R., Agudo I., Fernandez-Gago C., Trust management systems for wireless sensor networks: best practices Computer Communications 2010 33 9 1086 1093
-
(2010)
Computer Communications
, vol.33
, Issue.9
, pp. 1086-1093
-
-
Lopez, J.1
Roman, R.2
Agudo, I.3
Fernandez-Gago, C.4
-
50
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
article 6
-
Law Y. W., Palaniswami M., Hoesel L. V., Doumen J., Hartel P., Havinga P., Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols ACM Transactions on Sensor Networks 2009 5 1, article 6
-
(2009)
ACM Transactions on Sensor Networks
, vol.5
, Issue.1
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
55
-
-
14844342644
-
Generic groups, collision resistance, and ECDSA
-
Brown D. R. L., Generic groups, collision resistance, and ECDSA Designs, Codes, and Cryptography 2005 35 1 119 152
-
(2005)
Designs, Codes, and Cryptography
, vol.35
, Issue.1
, pp. 119-152
-
-
Brown, D.R.L.1
-
58
-
-
38049067956
-
On the security and the efficiency of the Merkle signature scheme
-
Garca L. C. C., On the security and the efficiency of the Merkle signature scheme Cryptology ePrint Archive: Report 2005 2005/192
-
(2005)
Cryptology EPrint Archive: Report
, vol.2005
, Issue.192
-
-
Garca, L.C.C.1
-
61
-
-
0003410290
-
-
Princeton, NJ, USA Princeton University Press
-
Hamilton J. D., Time Series Analysis 1994 Princeton, NJ, USA Princeton University Press
-
(1994)
Time Series Analysis
-
-
Hamilton, J.D.1
-
63
-
-
5344244656
-
-
R Development Core Team, Vienna, Austria R Foundation for Statistical Computing
-
R Development Core Team, R: A Language and Environment for Statistical Computing 2008 Vienna, Austria R Foundation for Statistical Computing
-
(2008)
R: A Language and Environment for Statistical Computing
-
-
|