-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Mar
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey, " Computer Networks (Elsevier), vol. 38, no. 4, pp. 393-422, Mar. 2002.
-
(2002)
Computer Networks (Elsevier)
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
4243082091
-
Security in wireless sensor networks
-
Jun
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks, " Commun. ACM, vol. 47, no. 6, pp. 53-57, Jun. 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
3
-
-
38149062124
-
Security in wireless sensor networks
-
Jan
-
V. Giruka, M. Singhal, J. Royalty, and S. Varanasi, "Security in wireless sensor networks, " Wirel. Commun. Mob. Comput. (Wiley), vol. 8, no. 1, pp. 1-24, Jan. 2008.
-
(2008)
Wirel. Commun. Mob. Comput. (Wiley)
, vol.8
, Issue.1
, pp. 1-24
-
-
Giruka, V.1
Singhal, M.2
Royalty, J.3
Varanasi, S.4
-
5
-
-
70349694070
-
Double mobility: Coverage of the sea surface with mobile sensor networks
-
in, Rio de Janeiro, Brazil, Apr
-
J. Luo, D. Wang, and Q. Zhang, "Double mobility: coverage of the sea surface with mobile sensor networks, " in Proc. IEEE INFOCOM '09, Rio de Janeiro, Brazil, Apr. 2009, pp. 118-126.
-
(2009)
Proc. IEEE INFOCOM '09
, pp. 118-126
-
-
Luo, J.1
Wang, D.2
Zhang, Q.3
-
6
-
-
78751619231
-
Phero-trail: A bio-inspired location service for mobile underwater sensor networks
-
May
-
L. Vieira, U. Lee, and M. Gerla, "Phero-trail: a bio-inspired location service for mobile underwater sensor networks, " IEEE J. Sel. Areas Commun. (JSAC), vol. 28, no. 4, pp. 553-563, May 2010.
-
(2010)
IEEE J. Sel. Areas Commun. (JSAC)
, vol.28
, Issue.4
, pp. 553-563
-
-
Vieira, L.1
Lee, U.2
Gerla, M.3
-
7
-
-
77649143550
-
A 2G-RFID-based e-healthcare system
-
Feb
-
M. Chen, S. Gonzalez, V. Leung, Q. Zhang, and M. Li, "A 2G-RFID-based e-healthcare system, " IEEE Wireless Communications Magazine, vol. 17, no. 1, pp. 37-43, Feb. 2010.
-
(2010)
IEEE Wireless Communications Magazine
, vol.17
, Issue.1
, pp. 37-43
-
-
Chen, M.1
Gonzalez, S.2
Leung, V.3
Zhang, Q.4
Li, M.5
-
8
-
-
84861959653
-
Selective code dissemination in mobile wireless sensor networks
-
in, Leuven, Belgium, Dec
-
B. Pásztor, L. Mottola, C. Mascolo, and G. P. Picco, "Selective code dissemination in mobile wireless sensor networks, " in Proc. ACM/IFIP/USENIX Middleware '08, Leuven, Belgium, Dec. 2008, pp. 113-115.
-
(2008)
Proc. ACM/IFIP/USENIX Middleware '08
, pp. 113-115
-
-
Pásztor, B.1
Mottola, L.2
Mascolo, C.3
Picco, G.P.4
-
9
-
-
33744928874
-
Robomote: Enabling mobility in sensor networks
-
in, Los Angeles, CA, USA, Apr
-
K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. Sukhatme, "Robomote: enabling mobility in sensor networks, " in Proc. 4th IEEE Int. Symp. on Information Processing in Sensor Networks (IPSN '05), Los Angeles, CA, USA, Apr. 2005, pp. 404-409.
-
(2005)
Proc. 4th IEEE Int. Symp. on Information Processing in Sensor Networks (IPSN '05)
, pp. 404-409
-
-
Dantu, K.1
Rahimi, M.2
Shah, H.3
Babel, S.4
Dhariwal, A.5
Sukhatme, G.6
-
10
-
-
29844435167
-
Mobility improves coverage of sensor networks
-
in, Urbana-Champaign, IL, USA, May
-
B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility improves coverage of sensor networks, " in Proc. ACM MobiHoc '05, Urbana-Champaign, IL, USA, May 2005, pp. 300-308.
-
(2005)
Proc. ACM MobiHoc '05
, pp. 300-308
-
-
Liu, B.1
Brass, P.2
Dousse, O.3
Nain, P.4
Towsley, D.5
-
11
-
-
70349308780
-
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
-
Aug
-
J. Lopez, R. Roman, and C. Alcaraz, "Analysis of security threats, requirements, technologies and standards in wireless sensor networks, " Foundations of Security Analysis and Design V, vol. 5705, pp. 289-338, Aug. 2009.
-
(2009)
Foundations of Security Analysis and Design V
, vol.5705
, pp. 289-338
-
-
Lopez, J.1
Roman, R.2
Alcaraz, C.3
-
12
-
-
34247354594
-
Sensor networks of freely drifting autonomous underwater explorers
-
in, Los Angeles, CA, USA, Sep
-
J. Jaffe and C. Schurgers, "Sensor networks of freely drifting autonomous underwater explorers, " in Proc. 1st ACM Int. Workshop on Underwater Networks (WUWNet '06), Los Angeles, CA, USA, Sep. 2006, pp. 93-96.
-
(2006)
Proc. 1st ACM Int. Workshop on Underwater Networks (WUWNet '06)
, pp. 93-96
-
-
Jaffe, J.1
Schurgers, C.2
-
13
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a survey, " IEEE Commun. Surveys Tutorial, vol. 10, no. 3, pp. 6-28, 2008.
-
(2008)
IEEE Commun. Surveys Tutorial
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
14
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
in, Hong Kong, Mar
-
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch me (if you can): data survival in unattended sensor networks, " in Proc. IEEE PerCom '08, Hong Kong, Mar. 2008, pp. 185-194.
-
(2008)
Proc. IEEE PerCom '08
, pp. 185-194
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
15
-
-
65249138169
-
New adversary and new threats: Security in unattended sensor networks
-
D. Ma, C. Soriente, and G. Tsudik, "New adversary and new threats: security in unattended sensor networks, " IEEE Network, vol. 23, no. 2, pp. 43-48, 2009.
-
(2009)
IEEE Network
, vol.23
, Issue.2
, pp. 43-48
-
-
Ma, D.1
Soriente, C.2
Tsudik, G.3
-
16
-
-
33847255502
-
A practical study of transitory master key establishment for wireless sensor networks
-
in, Athens, Greece, Sep
-
J. Deng, C. Hartung, R. Han, and S. Mishra, "A practical study of transitory master key establishment for wireless sensor networks, " in Proc. IEEE SecureComm '05, Athens, Greece, Sep. 2005, pp. 289-302.
-
(2005)
Proc. IEEE SecureComm '05
, pp. 289-302
-
-
Deng, J.1
Hartung, C.2
Han, R.3
Mishra, S.4
-
18
-
-
58049110209
-
DISH: Distributed Self-Healing
-
in, Safety, and Security of Distributed Systems (SSS '08), Detroit, MI, USA, Nov
-
D. Ma and G. Tsudik, "DISH: Distributed Self-Healing, " in Proc. 10th Int. Symp. on Stabilization, Safety, and Security of Distributed Systems (SSS '08), Detroit, MI, USA, Nov. 2008, pp. 47-62.
-
(2008)
Proc. 10th Int. Symp. on Stabilization
, pp. 47-62
-
-
Ma, D.1
Tsudik, G.2
-
19
-
-
58149086240
-
POSH: Proactive co-Operative Self-Healing in unattended wireless sensor networks
-
in, Napoli, Italy, Oct
-
R. Di Pietro, D. Ma, C. Soriente, and G. Tsudik, "POSH: Proactive co-Operative Self-Healing in unattended wireless sensor networks, " in Proc. IEEE Symp. on Reliable Distributed Systems (SRDS '08), Napoli, Italy, Oct. 2008, pp. 185-194.
-
(2008)
Proc. IEEE Symp. on Reliable Distributed Systems (SRDS '08)
, pp. 185-194
-
-
Di Pietro, R.1
Ma, D.2
Soriente, C.3
Tsudik, G.4
-
20
-
-
79551653442
-
A scheme for secure and reliable distributed data storage in unattended WSNs
-
in, Miami, FL, USA, Dec
-
Y. Ren, V. Oleshchuk, and F. Y. Li, "A scheme for secure and reliable distributed data storage in unattended WSNs, " in Proc. IEEE GLOBECOM '10, Miami, FL, USA, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE GLOBECOM '10
, pp. 1-6
-
-
Ren, Y.1
Oleshchuk, V.2
Li, F.Y.3
-
21
-
-
70449419951
-
Data security in unattended wireless sensor networks
-
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Data security in unattended wireless sensor networks, " IEEE Trans. on Computers, vol. 58, no. 11, pp. 1500-1511, 2009.
-
(2009)
IEEE Trans. on Computers
, vol.58
, Issue.11
, pp. 1500-1511
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
22
-
-
67650465277
-
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
-
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks, " Ad Hoc Networks (Elsevier), vol. 7, no. 8, pp. 1463-1475, 2009.
-
(2009)
Ad Hoc Networks (Elsevier)
, vol.7
, Issue.8
, pp. 1463-1475
-
-
Di Pietro, R.1
Mancini, L.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
23
-
-
34548802484
-
Extended abstract: Forward-secure sequential aggregate authentication
-
in, Oakland, CA, USA, May
-
D. Ma and G. Tsudik, "Extended abstract: forward-secure sequential aggregate authentication, " in Proc. IEEE Symp. on Security and Privacy (S&P '07), Oakland, CA, USA, May. 2007, pp. 86-91.
-
(2007)
Proc. IEEE Symp. on Security and Privacy (S&P '07)
, pp. 86-91
-
-
Ma, D.1
Tsudik, G.2
-
24
-
-
72749098410
-
Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks
-
in, Networking and Services (MobiQuitous '09), Toronto, Canada, Jul
-
A. Yavuz and P. Ning, "Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks, " in Proc. 6th Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous '09), Toronto, Canada, Jul. 2009, pp. 1-10.
-
(2009)
Proc. 6th Int. Conf. on Mobile and Ubiquitous Systems: Computing
, pp. 1-10
-
-
Yavuz, A.1
Ning, P.2
-
25
-
-
35648972648
-
Securing distributed data storage and retrieval in sensor networks
-
in, NYC, USA, Mar
-
N. Subramanian, C. Yang, and W. Zhang, "Securing distributed data storage and retrieval in sensor networks, " in Proc. IEEE PerCom '07, vol. 3, no. 6, NYC, USA, Mar. 2007, pp. 659-676.
-
(2007)
Proc. IEEE PerCom '07
, vol.3
, Issue.6
, pp. 659-676
-
-
Subramanian, N.1
Yang, C.2
Zhang, W.3
-
26
-
-
70349682512
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
in, Rio de Janeiro, Brazil, Apr
-
S. Yu, K. Ren, and W. Lou, "FDAC: toward fine-grained distributed data access control in wireless sensor networks, " in Proc. IEEE INFOCOM '09, Rio de Janeiro, Brazil, Apr. 2009, pp. 963-971.
-
(2009)
Proc. IEEE INFOCOM '09
, pp. 963-971
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
27
-
-
70349658629
-
DP2AC: Distributed Privacy-Preserving Access Control in sensor networks
-
in, Rio de Janeiro, Brazil, Apr
-
R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed Privacy-Preserving Access Control in sensor networks, " in Proc. IEEE INFOCOM '09, Rio de Janeiro, Brazil, Apr. 2009, pp. 1251-1259.
-
(2009)
Proc. IEEE INFOCOM '09
, pp. 1251-1259
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
28
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
in, Columbus, OH, USA, Jun
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor network routing, " in Proc. 25th IEEE Int. Conf. on Distributed Computing Systems (ICDCS '05), Columbus, OH, USA, Jun. 2005, pp. 599-608.
-
(2005)
Proc. 25th IEEE Int. Conf. on Distributed Computing Systems (ICDCS '05)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
29
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
in, Phoenix, AZ, USA, Apr
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards statistically strong source anonymity for sensor networks, " in Proc. IEEE INFOCOM '08, Phoenix, AZ, USA, Apr. 2008, pp. 51-55.
-
(2008)
Proc. IEEE INFOCOM '08
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
30
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
in, Beijing, China, Oct
-
K. Mehta, D. Liu, and M. Wright, "Location privacy in sensor networks against a global eavesdropper, " in Proc. IEEE Int. Conf. on Network Protocols (ICNP '07), Beijing, China, Oct. 2007, pp. 314-323.
-
(2007)
Proc. IEEE Int. Conf. on Network Protocols (ICNP '07)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
31
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
in, Anchorage, AL, USA, May
-
Y. Jian, S. Chen, Z. Zhang, and L. Zhang, "Protecting receiver-location privacy in wireless sensor networks, " in Proc. IEEE INFOCOM '07, Anchorage, AL, USA, May 2007, pp. 1955-1963.
-
(2007)
Proc. IEEE INFOCOM '07
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
32
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
J. Deng, R. Han, and S. Mishra, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks, " Pervasive and Mobile Computing (Elsevier), vol. 2, no. 2, pp. 159-186, 2006.
-
(2006)
Pervasive and Mobile Computing (Elsevier)
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
33
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
in, Urbana-Champaign, IL, USA, May
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks, " in Proc. ACM MobiHoc '05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
-
(2005)
Proc. ACM MobiHoc '05
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
34
-
-
51849099823
-
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
-
H. Song, S. Zhu, W. Zhang, and G. Cao, "Least privilege and privilege deprivation: toward tolerating mobile sink compromises in wireless sensor networks, " ACM Trans. Sen. Netw. (TOSN), vol. 4, no. 4, pp. 1-34, 2008.
-
(2008)
ACM Trans. Sen. Netw. (TOSN)
, vol.4
, Issue.4
, pp. 1-34
-
-
Song, H.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
35
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
-
in, Alexandria, VA, USA, Mar
-
M. Conti, R. Di Pietro, L. Mancini, and A. Mei, "Emergent properties: detection of the node-capture attack in mobile wireless sensor networks, " in Proc. 1st ACM Conf. on Wireless Network Security (WiSec '08), Alexandria, VA, USA, Mar. 2008, pp. 214-219.
-
(2008)
Proc. 1st ACM Conf. on Wireless Network Security (WiSec '08)
, pp. 214-219
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.3
Mei, A.4
-
36
-
-
78650085921
-
The smallville effect: Social ties make mobile networks more secure against node capture attack
-
in, Bodrum, Turkey, Oct
-
M. Conti, R. Di Pietro, A. Gabrielli, L. V. Mancini, and A. Mei, "The smallville effect: social ties make mobile networks more secure against node capture attack, " in Proc. 8th ACM Int. Symp. on Mobility Management and Wireless Access (MobiWac'10), Bodrum, Turkey, Oct. 2010, pp. 99-106.
-
(2010)
Proc. 8th ACM Int. Symp. on Mobility Management and Wireless Access (MobiWac'10)
, pp. 99-106
-
-
Conti, M.1
Di Pietro, R.2
Gabrielli, A.3
Mancini, L.V.4
Mei, A.5
-
37
-
-
77953295155
-
Intrusion-resilience in mobile unattended WSNs
-
in, San Diego, CA, USA, Mar
-
R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, "Intrusion-resilience in mobile unattended WSNs, " in Proc. IEEE INFOCOM '10, San Diego, CA, USA, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM '10
, pp. 1-9
-
-
Di Pietro, R.1
Oligeri, G.2
Soriente, C.3
Tsudik, G.4
-
38
-
-
78650530349
-
Securing mobile unattended WSNs against a mobile adversary
-
in, New Delhi, India, Oct
-
R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, "Securing mobile unattended WSNs against a mobile adversary, " in Proc. 29th IEEE Int. Symp. on Reliable Distributed Systems (SRDS'10), New Delhi, India, Oct. 2010, pp. 11-20.
-
(2010)
Proc. 29th IEEE Int. Symp. on Reliable Distributed Systems (SRDS'10)
, pp. 11-20
-
-
Di Pietro, R.1
Oligeri, G.2
Soriente, C.3
Tsudik, G.4
-
40
-
-
84880879872
-
Forward-secure signatures with optimal signing and verifying
-
in
-
G. Itkis and L. Reyzin, "Forward-secure signatures with optimal signing and verifying, " in Proc. Advances in Cryptology-CRYPTO '01, 2001, pp. 332-354.
-
(2001)
Proc. Advances in Cryptology-CRYPTO '01
, pp. 332-354
-
-
Itkis, G.1
Reyzin, L.2
-
42
-
-
84947254092
-
Key-insulated public key cryptosystems
-
in
-
Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key-insulated public key cryptosystems, " in Proc. Advances in Cryptology-EUROCRYPT '02, 2002, pp. 65-82.
-
(2002)
Proc. Advances in Cryptology-EUROCRYPT '02
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
43
-
-
35248884707
-
Intrusion-resilient public-key encryption
-
in
-
Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, "Intrusion-resilient public-key encryption, " in Proc. Topics in Cryptology-CT-RSA '03, 2003, pp. 19-32.
-
(2003)
Proc. Topics in Cryptology-CT-RSA '03
, pp. 19-32
-
-
Dodis, Y.1
Franklin, M.2
Katz, J.3
Miyaji, A.4
Yung, M.5
-
44
-
-
79955515260
-
A generic construction for intrusion-resilient public-key encryption
-
in
-
Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, "A generic construction for intrusion-resilient public-key encryption, " in Proc. Topics in Cryptology-CT-RSA '04, 2004, pp. 1997-1997.
-
(2004)
Proc. Topics in Cryptology-CT-RSA '04
, pp. 1997
-
-
Dodis, Y.1
Franklin, M.2
Katz, J.3
Miyaji, A.4
Yung, M.5
-
45
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Sep
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks, " Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
46
-
-
85180532806
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
in, San Diego, CA, USA, Feb
-
D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, " in Proc. 10th Annual Network and Distributed System Security Symp. (NDSS '03), vol. 276, San Diego, CA, USA, Feb. 2003.
-
(2003)
Proc. 10th Annual Network and Distributed System Security Symp. (NDSS '03)
, vol.276
-
-
Liu, D.1
Ning, P.2
-
47
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
in, Oakland, CA, USA, May
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, " in Proc. IEEE Symp. on Security and Privacy (S&P '04), Oakland, CA, USA, May. 2004, pp. 259-271.
-
(2004)
Proc. IEEE Symp. on Security and Privacy (S&P '04)
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
48
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks, " ACM Tran. Sen. Netw. (TOSN), vol. 2, no. 4, pp. 500-528, 2006.
-
(2006)
ACM Tran. Sen. Netw. (TOSN)
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
49
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
in, Washington D.C., USA, Oct
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks, " in Proc. 10th ACM Conf. on Computer and Communications Security (CCS '03), Washington D.C., USA, Oct. 2003, pp. 62-72.
-
(2003)
Proc. 10th ACM Conf. on Computer and Communications Security (CCS '03)
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
50
-
-
23044435711
-
Short signatures from the Weil pairing
-
Aug, Extended abstract in Proc. ASIACRYPT '01
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing, " J. Cryptology, vol. 17, no. 4, pp. 297-319, Aug. 2004, Extended abstract in Proc. ASIACRYPT '01.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
51
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps, " in Proc. Advances in Cryptology-EUROCRYPT '03, 2003, pp. 641-641.
-
(2003)
Proc. Advances in Cryptology-EUROCRYPT '03
, pp. 641
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
52
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
in
-
A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham, "Sequential aggregate signatures from trapdoor permutations, " in Proc. Advances in Cryptology-EUROCRYPT '04, 2004, pp. 74-90.
-
(2004)
Proc. Advances in Cryptology-EUROCRYPT '04
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
53
-
-
33746066354
-
Sequential aggregate signatures and multisignatures without random oracles
-
in
-
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters, "Sequential aggregate signatures and multisignatures without random oracles, " in Proc. Advances in Cryptology-EUROCRYPT '06, 2006, pp. 465-485.
-
(2006)
Proc. Advances in Cryptology-EUROCRYPT '06
, pp. 465-485
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
54
-
-
0010602889
-
Time-lock puzzles and timed-release crypto
-
in, Cambridge, MA, USA, Tech. Rep
-
R. L. Rivest, A. Shamir, and D. A. Wagner, "Time-lock puzzles and timed-release crypto, " Massachusetts Institute of Technology (MIT), Cambridge, MA, USA, Tech. Rep., 1996.
-
(1996)
Massachusetts Institute of Technology (MIT)
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
55
-
-
0028513932
-
Access control: Principle and practice
-
R. Sandhu and P. Samarati, "Access control: principle and practice, " IEEE Commun. Mag., vol. 32, no. 9, pp. 40-48, 1994.
-
(1994)
IEEE Commun. Mag
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
56
-
-
0030086382
-
Rolebased access control models
-
Aug
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Rolebased access control models, " IEEE Computer, vol. 29, no. 2, pp. 38-47, Aug. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
57
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
in
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences, " in Proc. Advances in Cryptology-CRYPTO '92, vol. 740, 1992, pp. 471-486.
-
(1992)
Proc. Advances in Cryptology-CRYPTO '92
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
58
-
-
74049147013
-
Attacking cryptographic schemes based on"perturbation polynomials"
-
in, Chicago, IL, USA, Nov
-
M. Albrecht, C. Gentry, S. Halevi, and J. Katz, "Attacking cryptographic schemes based on"perturbation polynomials", " in Proc. 16th ACM Conf. on Computer and Communications Security (CCS '09), Chicago, IL, USA, Nov. 2009, pp. 1-10.
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security (CCS '09)
, pp. 1-10
-
-
Albrecht, M.1
Gentry, C.2
Halevi, S.3
Katz, J.4
-
59
-
-
34547273527
-
Attributebased encryption for fine-grained access control of encrypted data
-
in, Alexandria, VA, USA, Oct
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attributebased encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM Conf. on Comp. Comm. Sec. (CCS '06), Alexandria, VA, USA, Oct. 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM Conf. on Comp. Comm. Sec. (CCS '06)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
60
-
-
79955504873
-
-
ORION, [Online], Available
-
ORION. [Online]. Available: http://www.joiscience.org/ocean observing/advisors
-
-
-
-
61
-
-
79955507907
-
-
NOPP. [Online], Available
-
NOPP. [Online]. Available: http://www.nopp.org
-
-
-
-
62
-
-
79955508082
-
-
IOOS, [Online], Available
-
IOOS. [Online]. Available: http://www.ocean.us
-
-
-
-
63
-
-
77749271080
-
Query privacy in wireless sensor networks
-
A preliminary version of this paper appeared in Proc. IEEE SECON '07
-
B. Carbunar, Y. Yu, W. Shi, M. Pearce, and V. Vasudevan, "Query privacy in wireless sensor networks, " ACM Trans. Sen. Netw. (TOSN), vol. 6, no. 2, pp. 1-34, 2010, A preliminary version of this paper appeared in Proc. IEEE SECON '07.
-
(2010)
ACM Trans. Sen. Netw. (TOSN)
, vol.6
, Issue.2
, pp. 1-34
-
-
Carbunar, B.1
Yu, Y.2
Shi, W.3
Pearce, M.4
Vasudevan, V.5
-
64
-
-
0020915882
-
Blind signatures for untraceable payments
-
in
-
D. Chaum, "Blind signatures for untraceable payments, " in Proc. Advances in Cryptology-CRYPTO '82, vol. 82, 1982, pp. 199-203.
-
(1982)
Proc. Advances in Cryptology-CRYPTO '82
, vol.82
, pp. 199-203
-
-
Chaum, D.1
-
65
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
in, Boston, MA, USA, Aug
-
B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks, " in Proc. ACM MobiCom '00, Boston, MA, USA, Aug. 2000, pp. 243-254.
-
(2000)
Proc. ACM MobiCom '00
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
66
-
-
72449171946
-
Double rulings for information brokerage in sensor networks
-
Dec, A preliminary version of this paper appeared in Proc. ACM MobiCom '06
-
R. Sarkar, X. Zhu, and J. Gao, "Double rulings for information brokerage in sensor networks, " IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1902-1915, Dec. 2009, A preliminary version of this paper appeared in Proc. ACM MobiCom '06.
-
(2009)
IEEE/ACM Trans. Netw
, vol.17
, Issue.6
, pp. 1902-1915
-
-
Sarkar, R.1
Zhu, X.2
Gao, J.3
-
67
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
in, Athens, Greece, Sep
-
J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks, " in Proc. 1st IEEE Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks (SecureComm '05), Athens, Greece, Sep. 2005, pp. 113-126.
-
(2005)
Proc. 1st IEEE Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks (SecureComm '05)
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
68
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
in, Alexandria, VA, USA, Mar
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards event source unobservability with minimum network traffic in sensor networks, " in Proc. 1st ACM Conf. on Wireless Network Security (WiSec '08), Alexandria, VA, USA, Mar. 2008, pp. 77-88.
-
(2008)
Proc. 1st ACM Conf. on Wireless Network Security (WiSec '08)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
69
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
in, Berkeley, CA, USA, Apr
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses, " in Proc. 3rd IEEE Int. Symp. on Information Processing in Sensor Networks (IPSN '04), Berkeley, CA, USA, Apr. 2004, pp. 259-268.
-
(2004)
Proc. 3rd IEEE Int. Symp. on Information Processing in Sensor Networks (IPSN '04)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
|