-
1
-
-
33747826020
-
Mobility-based communication in wireless sensor networks
-
July
-
E. Ekici, Y. Gu, and D. Bozdag, "Mobility-based communication in wireless sensor networks," Communications Magazine, IEEE, vol. 44, no. 7, pp. 56-62, July 2006.
-
(2006)
Communications Magazine, IEEE
, vol.44
, Issue.7
, pp. 56-62
-
-
Ekici, E.1
Gu, Y.2
Bozdag, D.3
-
2
-
-
33745639957
-
-
University of Colorado at Boulder, Technical Report TR-CU-CS-990-05
-
C. Hartung, J. Balasalle, and R. Han, "Node compromise in sensor networks: The need for secure systems," University of Colorado at Boulder, Technical Report TR-CU-CS-990-05, 2005.
-
(2005)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
5
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key-insulated public key cryptosystems," in International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'02), 2002, pp. 65-82.
-
International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'02), 2002
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
6
-
-
67650178245
-
Key insulation and intrusion resilience over a public channel
-
M. Bellare, S. Duan, and A. Palacio, "Key insulation and intrusion resilience over a public channel," in The Cryptographers' Track at the RSA Conference (CT-RSA'09), 2009, pp. 84-99.
-
The Cryptographers' Track at the RSA Conference (CT-RSA'09), 2009
, pp. 84-99
-
-
Bellare, M.1
Duan, S.2
Palacio, A.3
-
7
-
-
58149086240
-
POSH: Proactive cooperative self-healing in unattended wireless sensor networks
-
R. Di Pietro, D. Ma, C. Soriente, and G. Tsudik, "POSH: Proactive cooperative self-healing in unattended wireless sensor networks," in 27th IEEE Symposium on Reliable Distributed Systems (SRDS'08), 2008, pp. 185-194.
-
27th IEEE Symposium on Reliable Distributed Systems (SRDS'08), 2008
, pp. 185-194
-
-
Di Pietro, R.1
Ma, D.2
Soriente, C.3
Tsudik, G.4
-
8
-
-
58049110209
-
Dish: Distributed self-healing
-
D. Ma and G. Tsudik, "Dish: Distributed self-healing," in 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'08), 2008, pp. 47-62.
-
10th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'08), 2008
, pp. 47-62
-
-
Ma, D.1
Tsudik, G.2
-
9
-
-
77953295155
-
Intrusion-resilience in mobile unattended wsns
-
in press
-
R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, "Intrusion-resilience in mobile unattended wsns," in 29th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'10), 2010, in press.
-
29th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'10), 2010
-
-
Di Pietro, R.1
Oligeri, G.2
Soriente, C.3
Tsudik, G.4
-
10
-
-
29844435167
-
Mobility improves coverage of sensor networks
-
B. Liu, P. Braß, O. Dousse, P. Nain, and D. F. Towsley, "Mobility improves coverage of sensor networks," in 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05), 2005, pp. 300-308.
-
6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05), 2005
, pp. 300-308
-
-
Liu, B.1
Braß, P.2
Dousse, O.3
Nain, P.4
Towsley, D.F.5
-
11
-
-
25644433619
-
Sensor relocation in mobile sensor networks
-
G. Wang, G. Cao, T. F. L. Porta, and W. Zhang, "Sensor relocation in mobile sensor networks," in 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), 2005, pp. 2302-2312.
-
24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), 2005
, pp. 2302-2312
-
-
Wang, G.1
Cao, G.2
Porta, T.F.L.3
Zhang, W.4
-
12
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
-
M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, "Emergent properties: detection of the node-capture attack in mobile wireless sensor networks," in 1st ACM Conference on Wireless Network Security (WISEC'08), 2008, pp. 214-219.
-
1st ACM Conference on Wireless Network Security (WISEC'08), 2008
, pp. 214-219
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
14
-
-
38549139180
-
Constant storage self-healing key distribution with revocation in wireless sensor network
-
R. Dutta, Y. D. Wu, and S. Mukhopadhyay, "Constant storage self-healing key distribution with revocation in wireless sensor network," in IEEE International Conference on Communications (ICC'07), 2007, pp. 1323-1328.
-
IEEE International Conference on Communications (ICC'07), 2007
, pp. 1323-1328
-
-
Dutta, R.1
Wu, Y.D.2
Mukhopadhyay, S.3
-
15
-
-
3042593365
-
Whisper: Local secret maintenance in sensor networks
-
V. Naik, A. Arora, S. Bapat, and M. G. Gouda, "Whisper: Local secret maintenance in sensor networks," IEEE Distributed Systems Online, vol. 4, no. 9, 2003.
-
(2003)
IEEE Distributed Systems Online
, vol.4
, Issue.9
-
-
Naik, V.1
Arora, A.2
Bapat, S.3
Gouda, M.G.4
-
16
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch me (if you can): Data survival in unattended sensor networks," in 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'08), 2008, pp. 185-194.
-
6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'08), 2008
, pp. 185-194
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
17
-
-
70449419951
-
Data security in unattended sensor networks
-
-, "Data security in unattended sensor networks," IEEE Transactions on Computers, Special Issue on Autonomic Network Computing, vol. 50, no. 11, pp. 1500-1511, 2009.
-
(2009)
IEEE Transactions on Computers, Special Issue on Autonomic Network Computing
, vol.50
, Issue.11
, pp. 1500-1511
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
18
-
-
70349251527
-
Collaborative authentication in unattended wsns
-
R. Di Pietro, C. Soriente, A. Spognardi, and G. Tsudik, "Collaborative authentication in unattended wsns," in 2nd ACM Conference on Wireless Network Security (WISEC'09), 2009, pp. 237-244.
-
2nd ACM Conference on Wireless Network Security (WISEC'09), 2009
, pp. 237-244
-
-
Di Pietro, R.1
Soriente, C.2
Spognardi, A.3
Tsudik, G.4
-
19
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, pp. 483-502, 2002.
-
(2002)
Wireless Communications and Mobile Computing (WCMC): Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications
, vol.2
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
21
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L. van Doorn, and P. K. Khosla, "Swatt: Software-based attestation for embedded devices," in 2004 IEEE Symposium on Security and Privacy (SP'04), 2004, pp. 272-282.
-
(2004)
2004 IEEE Symposium on Security and Privacy (SP'04)
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.K.4
-
23
-
-
77953302820
-
-
Wiley, Ed., New York, NY, USA
-
I. Marius, Finite Markov Processes and their applications, Wiley, Ed., New York, NY, USA, 2007.
-
(2007)
Finite Markov Processes and Their Applications
-
-
Marius, I.1
|