-
1
-
-
85116610435
-
-
Next century challenges: mobile networking for 'smart dust'. Proceedings of International Conference on Mobile Computing and Network, MOBICOM'99
-
Kahn JM, Katz RH, Pister KSJ. Next century challenges: mobile networking for 'smart dust'. Proceedings of International Conference on Mobile Computing and Network, MOBICOM'99, 1999; 271-278.
-
(1999)
, pp. 271-278
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.S.J.3
-
2
-
-
27944449345
-
-
Enhancing source-location privacy in sensor network routing. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, ICDCS'05
-
Kamat P, Zhang Y, Trappe W, Ozturk C. Enhancing source-location privacy in sensor network routing. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, ICDCS'05, 2005; 599-608.
-
(2005)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
3
-
-
0242696192
-
-
Performance analysis of the CONFIDANT protocol cooperation of nodes-fairness in dynamic ad-hoc networks. Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'02
-
Buchegger S, Le Boudec J. Performance analysis of the CONFIDANT protocol cooperation of nodes-fairness in dynamic ad-hoc networks. Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'02, 2002; 226-236.
-
(2002)
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.2
-
4
-
-
0037629724
-
-
Cross-feature analysis for detecting ad-hoc routing anomalies. Proceedings of 23rd International Conference on Distributed Computing System
-
Huang Y, Fan W, Lee W. Cross-feature analysis for detecting ad-hoc routing anomalies. Proceedings of 23rd International Conference on Distributed Computing System, 2003.
-
(2003)
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
-
5
-
-
84969513597
-
-
Effective intrusion detection using multiple sensors in wireless ad hoc networks. Proceedings of 36th Annual Hawaii International Conference on System Sciences, HICSS'03
-
Kachirski O, Guha R. Effective intrusion detection using multiple sensors in wireless ad hoc networks. Proceedings of 36th Annual Hawaii International Conference on System Sciences, HICSS'03, 2003.
-
(2003)
-
-
Kachirski, O.1
Guha, R.2
-
6
-
-
39149119287
-
Collaborative techniques for intrusion detection in mobile ad-hoc networks
-
Marchang N, Datta R. Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Network 2008; 6: 508-523.
-
(2008)
Ad Hoc Network
, vol.6
, pp. 508-523
-
-
Marchang, N.1
Datta, R.2
-
7
-
-
85177502393
-
-
Intrusion detection in wireless ad-hoc network. Proceedings of Mobicom
-
Zhang Y, Lee W. Intrusion detection in wireless ad-hoc network. Proceedings of Mobicom, 2000.
-
(2000)
-
-
Zhang, Y.1
Lee, W.2
-
8
-
-
77953852618
-
-
Secure sensor network routing: a clean-slate approach. Proceedings of 2nd Conference on Future Networking Technologies, CoNEXT'06.
-
Bryan P, Luk M, Gaustad E, Perrig A. Secure sensor network routing: a clean-slate approach. Proceedings of 2nd Conference on Future Networking Technologies, CoNEXT'06, 2006.
-
(2006)
-
-
Bryan, P.1
Luk, M.2
Gaustad, E.3
Perrig, A.4
-
9
-
-
11244269535
-
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu Y, Johnson D, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks Journal 2003; 1(1): 175-192.
-
(2003)
Ad Hoc Networks Journal
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
10
-
-
17444426121
-
Ariadne: a secure on-demand routing protocol for ad hoc networks
-
Hu Y, Perrig A, Johnson D. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks Journal 2005; 11(1): 21-38.
-
(2005)
Wireless Networks Journal
, vol.11
, Issue.1
, pp. 21-38
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
11
-
-
84942426861
-
-
Secure routing in wireless sensor networks: attacks and countermeasurements. Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications.
-
Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasurements. Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
-
(2003)
-
-
Karlof, C.1
Wagner, D.2
-
12
-
-
33646552392
-
-
Secure routing and intrusion detection in ad hoc networks. Proceedings of 3rd International Conference on Pervasive Computing and Communications, IEEE
-
Patwardhan A, Parker J, Joshi A, Iorga M, Karygiannis T. Secure routing and intrusion detection in ad hoc networks. Proceedings of 3rd International Conference on Pervasive Computing and Communications, IEEE, 2005.
-
(2005)
-
-
Patwardhan, A.1
Parker, J.2
Joshi, A.3
Iorga, M.4
Karygiannis, T.5
-
13
-
-
0038487088
-
-
Random key pre-distribution schemes for sensor networks. Proceedings of IEEE Symposium on Security and Privacy.
-
Chan H, Perrig A, Song D. Random key pre-distribution schemes for sensor networks. Proceedings of IEEE Symposium on Security and Privacy, 2003; 197-213.
-
(2003)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
14
-
-
38049016463
-
-
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Proc. Applied Cryptography and Netwrok Security, ACNS'07.
-
Dutta R, Change EC, Mukhopadhyay S. Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Proc. Applied Cryptography and Netwrok Security, ACNS'07 pp. 385-400, 2007.
-
(2007)
, pp. 385-400
-
-
Dutta, R.1
Change, E.C.2
Mukhopadhyay, S.3
-
15
-
-
3042783638
-
-
A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'03
-
Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'03, 2003; 42-51.
-
(2003)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
16
-
-
0038341106
-
-
A key-management scheme for distributed sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'02.
-
Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. Proceedings of ACM Conference on Computer and Communication Security, CCS'02.
-
-
-
Eschenauer, L.1
Gligor, V.D.2
-
17
-
-
4544293215
-
-
Location-based pairwise key establishement for relatively static sensor networks. Proceedings of ACM Workshop on Security of Ad hoc and Sensor Networks
-
Liu D, Ning P. Location-based pairwise key establishement for relatively static sensor networks. Proceedings of ACM Workshop on Security of Ad hoc and Sensor Networks, 2003.
-
(2003)
-
-
Liu, D.1
Ning, P.2
-
18
-
-
84866860550
-
-
Improving key pre-distribution wih deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks
-
Liu D, Ning P. Improving key pre-distribution wih deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks, 2005.
-
(2005)
-
-
Liu, D.1
Ning, P.2
-
19
-
-
33749033368
-
-
Group-based key pre-distribution in wireless sensor networks. Proceedings of ACM Workshop on Wireless Security
-
Liu D, Ning P, Du W. Group-based key pre-distribution in wireless sensor networks. Proceedings of ACM Workshop on Wireless Security, 2005.
-
(2005)
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
20
-
-
3543050471
-
-
Efficient self-healing group key distribution with revocation capability. Proceedings of ACM Conference on Computer and Communication Security, CCS'03
-
Liu D, Ning P, Sun K. Efficient self-healing group key distribution with revocation capability. Proceedings of ACM Conference on Computer and Communication Security, CCS'03, 2003.
-
(2003)
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
21
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: security protocols for sensor networks. Wireless Networks Journal (WINE), 2002; 8(5): 521-534.
-
(2002)
Wireless Networks Journal (WINE)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
22
-
-
10044284351
-
-
LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of ACM Conferenc on Computer and Communication Security, CCS'03.
-
Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of ACM Conferenc on Computer and Communication Security, CCS'03, 2003; 62-72.
-
(2003)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
23
-
-
33746086383
-
-
Distributed user access control in sensor networks. Proceedings of Distributed Computing in Sensor Systems, LNCS 4026
-
Wang H, Li Q. Distributed user access control in sensor networks. Proceedings of Distributed Computing in Sensor Systems, LNCS 4026, 2006; 305-320.
-
(2006)
, pp. 305-320
-
-
Wang, H.1
Li, Q.2
-
24
-
-
33750012404
-
Access control in wireless sensor networks
-
Zhou Y, Zhanga Y, Fang Y. Access control in wireless sensor networks. Ad Hoc Networks 2007; 5(1); 3-13.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhanga, Y.2
Fang, Y.3
-
25
-
-
33845747795
-
-
Secure hierarchical in-network aggregation in sensor networks. Proceedings of ACM Conference on Computer and Communications Security, CCS'06
-
Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks. Proceedings of ACM Conference on Computer and Communications Security, CCS'06, 2006.
-
(2006)
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
26
-
-
84943753034
-
-
Secure aggregation for wireless networks. Proceedings of 2003 Symposium on Applications and the Internet Workshops, SAINT'03.
-
Hu L, Evans D. Secure aggregation for wireless networks. Proceedings of 2003 Symposium on Applications and the Internet Workshops, SAINT'03, 2003; 384-394.
-
(2003)
, pp. 384-394
-
-
Hu, L.1
Evans, D.2
-
27
-
-
84978428047
-
-
TAG: a tiny aggregation service for ad-hoc sensor networks. Proceedings of 5th Annul Symposium on Operating Systems Design and Implementation, OSDI'02
-
Madden SR, Franklin MJ, Hellerstein JM, Hong W. TAG: a tiny aggregation service for ad-hoc sensor networks. Proceedings of 5th Annul Symposium on Operating Systems Design and Implementation, OSDI'02, 2002.
-
(2002)
-
-
Madden, S.R.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
28
-
-
79951808341
-
-
SIA: secure information aggregation in sensor networks. Proceedings of ACM SenSys
-
Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. Proceedings of ACM SenSys, 2003.
-
(2003)
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
29
-
-
48049100992
-
-
Query privacy in wireless sensor networks. Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07
-
Carbunar B, Yu Y, Shi L, Pearce M, Vasudevan V. Query privacy in wireless sensor networks. Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07, 2007; 203-212.
-
(2007)
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, L.3
Pearce, M.4
Vasudevan, V.5
-
30
-
-
48349110568
-
-
Location privacy in sensor networks against a global eavesdropper. Proceedings of IEEE International Conference on Network Protocols, ICNP'07.
-
Mehta K, Liu D, Wright M. Location privacy in sensor networks against a global eavesdropper. Proceedings of IEEE International Conference on Network Protocols, ICNP'07, 2007; 314-323.
-
(2007)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
31
-
-
33845942290
-
-
Entrapping adversaries for source protection in sensor networks. Proceedings of International Symposium on World of Wireless, Mobile and Multimedia Network, WoWMoM'06.
-
Ouyang Y, Le Z, Chen G, Ford J, Makedon F. Entrapping adversaries for source protection in sensor networks. Proceedings of International Symposium on World of Wireless, Mobile and Multimedia Network, WoWMoM'06, 2006; 23-34.
-
(2006)
, pp. 23-34
-
-
Ouyang, Y.1
Le, Z.2
Chen, G.3
Ford, J.4
Makedon, F.5
-
32
-
-
14844303406
-
-
Source-location privacy in energy-contained sensor network routing. Proceedings of 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
-
Ozturk C, Zhang Y, Trappe W. Source-location privacy in energy-contained sensor network routing. Proceedings of 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04, 2004; 88-93.
-
(2004)
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
33
-
-
34848852681
-
-
Temporal privacy in wireless sensor networks. Proceedings of 27th International Conference on Distributed Computing Systems, ICDCS'07
-
Kamat P, Xu W, Trappe W, Zhang Y. Temporal privacy in wireless sensor networks. Proceedings of 27th International Conference on Distributed Computing Systems, ICDCS'07, 2007; 23-30.
-
(2007)
, pp. 23-30
-
-
Kamat, P.1
Xu, W.2
Trappe, W.3
Zhang, Y.4
-
35
-
-
0033892676
-
Performance comparison of two on-demand routing procotols for ad hoc networks
-
Das S, Perkins C, Royer E. Performance comparison of two on-demand routing procotols for ad hoc networks. Proceedings of Infocom 2000, 2000; 1: 3-12.
-
(2000)
Proceedings of Infocom 2000
, vol.1
, pp. 3-12
-
-
Das, S.1
Perkins, C.2
Royer, E.3
-
36
-
-
84947615990
-
-
Trusted Computing Group. Available at.
-
Trusted Computing Group. Available at.
-
-
-
-
37
-
-
34548720911
-
-
A Hierarchical Key Establishment Scheme for Wireless Sensor Networks. Proc. 21st International Conference on Advanced Networking and Application, AINA'07.
-
Ibriq J, Mahgoub I. A Hierarchical Key Establishment Scheme for Wireless Sensor Networks. Proc. 21st International Conference on Advanced Networking and Application, AINA'07, 2007.
-
(2007)
-
-
Ibriq, J.1
Mahgoub, I.2
-
38
-
-
84947612847
-
-
-
-
-
40
-
-
84947611642
-
-
TCG Mobile Phone Work Group. Available at.
-
TCG Mobile Phone Work Group. Available at.
-
-
-
-
41
-
-
51649107345
-
-
On the deployment of mobile trusted modules. Proceedings of Wireless Communications and Networking Conference, WCNC'08
-
Schmidt AU, Kuntze N, Kasper M. On the deployment of mobile trusted modules. Proceedings of Wireless Communications and Networking Conference, WCNC'08, 2008.
-
(2008)
-
-
Schmidt, A.U.1
Kuntze, N.2
Kasper, M.3
-
42
-
-
79951798370
-
-
TCG. TPM Main,Part 3 Command, TCG Secpfication Ver. 1.2, Revision 62
-
TCG. TPM Main, Part 3 Command, TCG Secpfication Ver. 1.2, Revision 62, 2003;
-
(2003)
-
-
-
43
-
-
79951789774
-
-
TCG. TPM Main, Part 2 TPM data Structure, TCG Secpfication Ver. 1.2, Revision 62
-
TCG. TPM Main, Part 2 TPM data Structure, TCG Secpfication Ver. 1.2, Revision 62, 2003;
-
(2003)
-
-
-
44
-
-
84955557456
-
-
Hiding routing information. Proceedings of 1st International Workshop on Information Hiding, LNCS 1174
-
Goldschlag DM, Reed MG, Syverson PF. Hiding routing information. Proceedings of 1st International Workshop on Information Hiding, LNCS 1174, 1996; 137-150.
-
(1996)
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
45
-
-
0035009259
-
-
A clustering scheme for hierarchical control in multi-hop wireless networks. Proceedings of IEEE INFOCOM'01.
-
Banerjee S, Khuller S. A clustering scheme for hierarchical control in multi-hop wireless networks. Proceedings of IEEE INFOCOM'01.
-
-
-
Banerjee, S.1
Khuller, S.2
-
46
-
-
79951789096
-
-
Distributed clustering algorithm for ad-hoc networks. Proceedings of International Symposium on Parallel Architectures, Algorithms, and Networks
-
Basagni S. Distributed clustering algorithm for ad-hoc networks. Proceedings of International Symposium on Parallel Architectures, Algorithms, and Networks, 1999.
-
(1999)
-
-
Basagni, S.1
-
47
-
-
84947613205
-
-
Next century challenges: scalable coordination in sensor networks. Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM'99
-
Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: scalable coordination in sensor networks. Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM'99.
-
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
Kumar, S.4
-
48
-
-
84947618223
-
-
Exploiting heterogeneity in sensor networks. Proceedings of IEEE INFOCOM'05.
-
Yarvis M, et al. Exploiting heterogeneity in sensor networks. Proceedings of IEEE INFOCOM'05.
-
-
-
Yarvis, M.1
-
49
-
-
24644507953
-
-
On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of International Conference on Networking, ICN'05
-
Ferreira AC, Vila M, Oliveira B, Habib E, Wong HC, Loureiro AA. On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of International Conference on Networking, ICN'05, 2005; 449-458.
-
(2005)
, pp. 449-458
-
-
Ferreira, A.C.1
Vila, M.2
Oliveira, B.3
Habib, E.4
Wong, H.C.5
Loureiro, A.A.6
-
50
-
-
24644489093
-
-
LHA-SP: secure protocols for hierarchical wireless sensor networks. Proceedings of IFIP/IEEE International Symposium on Integrated Network Management
-
Oliveira LB, Wong HC, Loureiro AA. LHA-SP: secure protocols for hierarchical wireless sensor networks. Proceedings of IFIP/IEEE International Symposium on Integrated Network Management, 2005; 31-44.
-
(2005)
, pp. 31-44
-
-
Oliveira, L.B.1
Wong, H.C.2
Loureiro, A.A.3
-
51
-
-
1542317846
-
-
An authentication framework for hierarchical ad hoc sensor networks. Proceedings of ACM workshop on Wireless security, WiSE'03
-
Bohge M, Trappe W. An authentication framework for hierarchical ad hoc sensor networks. Proceedings of ACM workshop on Wireless security, WiSE'03, 2003; 79-87.
-
(2003)
, pp. 79-87
-
-
Bohge, M.1
Trappe, W.2
-
52
-
-
38149142765
-
-
Detecting node compromise in hybrid wireless sensor networks using attestation techniques. Proceedings of 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007, LNCS 4572
-
Kraub C, Stumpf F, Eckert C. Detecting node compromise in hybrid wireless sensor networks using attestation techniques. Proceedings of 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007, LNCS 4572, pp. 203-217.
-
-
-
Kraub, C.1
Stumpf, F.2
Eckert, C.3
-
53
-
-
33749013010
-
-
Privacy for RFID through trusted computing. Proceedings of ACM workshop on Privacy in the Electronic Society, WPES'05
-
Molnar D, Soppera A, Wagner D. Privacy for RFID through trusted computing. Proceedings of ACM workshop on Privacy in the Electronic Society, WPES'05, 2005; 31-34.
-
(2005)
, pp. 31-34
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
54
-
-
33746092119
-
-
High-power proxies for enhancing RFID privacy and utility. Proceedings of Privacy Enhancing Technologies (PET) Workshop
-
Juels A, Syverson P, Bailey D. High-power proxies for enhancing RFID privacy and utility. Proceedings of Privacy Enhancing Technologies (PET) Workshop, 2005; 210-226.
-
(2005)
, pp. 210-226
-
-
Juels, A.1
Syverson, P.2
Bailey, D.3
-
55
-
-
28344446682
-
-
Current and future trends in sensor networks: a survey. Proceedings of IFIP International Conference on Wireless and Optical Communications Networks, WOCN'05
-
Aboelaze M, Aloul F. Current and future trends in sensor networks: a survey. Proceedings of IFIP International Conference on Wireless and Optical Communications Networks, WOCN'05, 2005; 551-555.
-
(2005)
, pp. 551-555
-
-
Aboelaze, M.1
Aloul, F.2
-
56
-
-
33749405352
-
-
Trusted computing: providing security for peer-to-peer networks. Proceedings of IEEE International Conference on Peer-to-Peer Computing, P2P'05
-
Balfe S, Lakhani AD, Paterson KG. Trusted computing: providing security for peer-to-peer networks. Proceedings of IEEE International Conference on Peer-to-Peer Computing, P2P'05, 2005.
-
(2005)
-
-
Balfe, S.1
Lakhani, A.D.2
Paterson, K.G.3
-
57
-
-
79951789773
-
-
Impact of network density on data aggregation in wireless sensor networks. Proceedings of 1st International Conference on Distributed Computing Systems
-
Intanagonwiwat C, Estrin D, Govindan R, Heidemann J. Impact of network density on data aggregation in wireless sensor networks. Proceedings of 1st International Conference on Distributed Computing Systems, 2001.
-
(2001)
-
-
Intanagonwiwat, C.1
Estrin, D.2
Govindan, R.3
Heidemann, J.4
-
58
-
-
34250346420
-
-
Daonity---grid security with behaviour conformaity from trusted computing. Proceedings of ACM Workshop on Scalable Trusted Computing
-
Mao W, Yan F, Chen C. Daonity---grid security with behaviour conformaity from trusted computing. Proceedings of ACM Workshop on Scalable Trusted Computing, 2006; 43-46.
-
(2006)
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
-
59
-
-
84947618850
-
-
Trusted computing technologies for embedded systems and sensor networks. Presentation slides
-
Perrig A. Trusted computing technologies for embedded systems and sensor networks. Presentation slides
-
-
-
Perrig, A.1
|