-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
37849013265
-
Tampering with motes: Real-tampering physical attacks on wireless sensor networks
-
April
-
A. Becher, Z. Benenson, and M. Dornseif, "Tampering with motes: Real-tampering physical attacks on wireless sensor networks," in 3rd International Conference on Security in Pervasive Computing (SPC), April 2006, pp. 1-15.
-
(2006)
3rd International Conference on Security in Pervasive Computing (SPC)
, pp. 1-15
-
-
Becher, A.1
Benenson, Z.2
Dornseif, M.3
-
3
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
3rd Quarter
-
Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: A survey," IEEE Communications Surveys and Tutorials, vol. 10, no. 3, pp. 6-28, 3rd Quarter 2008.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
4
-
-
49549125198
-
A network coding approach to secret key distribution
-
Sept.
-
P. F. Oliveira and J. Barros, "A network coding approach to secret key distribution," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 414-423, Sept. 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 414-423
-
-
Oliveira, P.F.1
Barros, J.2
-
6
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networks
-
A. Khalili, J. Katz, and W. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," in Symposium on Applications and the Internet Workshops, 2003, pp. 342-346.
-
(2003)
Symposium on Applications and the Internet Workshops
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
8
-
-
37849002159
-
Openhsm: An open key life cycle protocol for public key infrastructure's hardware security modules
-
J. E. Martina, T. C. S. de Souza, and R. F. Custódio, "OpenHSM: An open key life cycle protocol for public key infrastructure's hardware security modules," in European PKI Workshop: Theory and Practice, 2007, pp. 220-235.
-
(2007)
European PKI Workshop: Theory and Practice
, pp. 220-235
-
-
Martina, J.E.1
De Souza, T.C.S.2
Custódio, R.F.3
-
9
-
-
33745142955
-
Network coding: An instant primer
-
January
-
C. Fragouli, J.-Y. L. Boudec, and J. Widmer, "Network coding: An instant primer," ACM SIGCOMM Computer Communication Review, vol. 36, no. 1, pp. 63-68, January 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.1
, pp. 63-68
-
-
Fragouli, C.1
Boudec, J.-Y.L.2
Widmer, J.3
-
10
-
-
45749150357
-
XORs in the air: Practical wireless network coding
-
June
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft, "XORs in the air: Practical wireless network coding," IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 497-510, June 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 497-510
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Médard, M.5
Crowcroft, J.6
-
11
-
-
36048947048
-
Fringe-effect capacitive proximity sensors for tamper proof enclosures
-
Feb.
-
H. Eren and L. Sandor, "Fringe-effect capacitive proximity sensors for tamper proof enclosures," in IEEE Sensors for Industry Conference (SIcon'05), Feb. 2005, pp. 22-26.
-
(2005)
IEEE Sensors for Industry Conference (SIcon'05)
, pp. 22-26
-
-
Eren, H.1
Sandor, L.2
|