-
1
-
-
0242696202
-
On the minimum node degree and connectivity of a wireless multihop network
-
Lausanne, Switzerland
-
C. Bettstetter, "On the minimum node degree and connectivity of a wireless multihop network," in Proc. ACM MobiHoc, Lausanne, Switzerland, 2002.
-
(2002)
Proc. ACM MobiHoc
-
-
Bettstetter, C.1
-
2
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Miami, FL
-
H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proc. IEEE INFOCOM,Miami, FL, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Chan, H.1
Perrig, A.2
-
3
-
-
70349270769
-
Efficient security primitives from a secure aggregation algorithm
-
Alexandria, VA
-
H. Chan and A. Perrig, "Efficient security primitives from a secure aggregation algorithm," in Proc. ACM CCS, Alexandria, VA, 2008.
-
(2008)
Proc. ACM CCS
-
-
Chan, H.1
Perrig, A.2
-
4
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
Alexandria, VA
-
H. Chan, A. Perrig, and D. Song, "Secure hierarchical in-network aggregation in sensor networks," in Proc. ACM CCS, Alexandria, VA, 2006.
-
(2006)
Proc. ACM CCS
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
70349262713
-
Towards energy-efficient skylinemonitoring in wireless sensor networks
-
Delft, The Netherlands
-
H. Chen, S. Zhou, and J. Guan, "Towards energy-efficient skylinemonitoring in wireless sensor networks," in Proc. EWSN, Delft, The Netherlands, 2007.
-
(2007)
Proc. EWSN
-
-
Chen, H.1
Zhou, S.2
Guan, J.3
-
6
-
-
85092638639
-
PRESTO: A predictive storage architecture for sensor networks
-
Santa Fe, NM
-
P. Desnoyers, D. Ganesan, H. Li, M. Li, and P. Shenoy, "PRESTO: A predictive storage architecture for sensor networks," in Proc. HotOS, Santa Fe, NM, 2005.
-
(2005)
Proc. HotOS
-
-
Desnoyers, P.1
Ganesan, D.2
Li, H.3
Li, M.4
Shenoy, P.5
-
7
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
Madison, WI
-
H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," in Proc. ACM SIGMOD, Madison, WI, 2002.
-
(2002)
Proc. ACM SIGMOD
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
8
-
-
85065578926
-
A privacy-preserving index for range queries
-
Toronto, Canada
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. VLDB, Toronto, Canada, 2004.
-
(2004)
Proc. VLDB
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
9
-
-
56749170948
-
Defending against false-endorsement-based DoS attacks in wireless sensor networks
-
Alexandria, VA
-
C. Krauß, M. Schneider, and C. Eckert, "Defending against false-endorsement- based DoS attacks in wireless sensor networks," in Proc. ACM WiSec, Alexandria, VA, 2008.
-
(2008)
Proc. ACM WiSec
-
-
Krauß, C.1
Schneider, M.2
Eckert, C.3
-
10
-
-
79957441514
-
Energy-efficient skyline query processing and maintenance in sensor networks
-
Napa Valley, CA
-
W. Liang, B. Chen, and J. Yu, "Energy-efficient skyline query processing and maintenance in sensor networks," in Proc. ACM CIKM, Napa Valley, CA, 2008.
-
(2008)
Proc. ACM CIKM
-
-
Liang, W.1
Chen, B.2
Yu, J.3
-
11
-
-
20344371174
-
Multi-dimensional range queries in sensor networks
-
Los Angeles, CA
-
X. Li, Y. Kim, R. Govindan, and W. Hong, "Multi-dimensional range queries in sensor networks," in Proc. ACM SenSys, Los Angeles, CA, 2003.
-
(2003)
Proc. ACM SenSys
-
-
Li, X.1
Kim, Y.2
Govindan, R.3
Hong, W.4
-
12
-
-
79953769032
-
Using the power of two choics to improve bloom filters
-
S. Lumetta and M. Mitzenmacher, "Using the power of two choics to improve bloom filters," Internet Math., vol. 4, no. 1, pp. 17-33, 2009.
-
(2009)
Internet Math
, vol.4
, Issue.1
, pp. 17-33
-
-
Lumetta, S.1
Mitzenmacher, M.2
-
13
-
-
85000276942
-
Multi-level TESLA: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multi-level TESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embedded Comput. Syst. (TECS), vol. 3, no. 4, pp. 800-836, 2004.
-
(2004)
ACM Trans. Embedded Comput. Syst. (TECS)
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
14
-
-
79957477818
-
Ultra-low power data storage for sensor networks
-
Nashville, TN
-
G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, "Ultra-low power data storage for sensor networks," in Proc. ACM/IEEE IPSN, Nashville, TN, 2006.
-
(2006)
Proc. ACM/IEEE IPSN
-
-
Mathur, G.1
Desnoyers, P.2
Ganesan, D.3
Shenoy, P.4
-
15
-
-
4344614110
-
TAG: A tiny AGgregation service for ad-hoc sensor networks
-
Boston, MA
-
S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TAG: A tiny AGgregation service for ad-hoc sensor networks," in Proc. USENIX OSDI, Boston, MA, 2002.
-
(2002)
Proc. USENIX OSDI
-
-
Madden, S.R.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
16
-
-
23944487783
-
TinyDB: An acquisitional query processing system for sensor networks
-
DOI 10.1145/1061318.1061322
-
S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: An acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005. (Pubitemid 41201813)
-
(2005)
ACM Transactions on Database Systems
, vol.30
, Issue.1
, pp. 122-173
-
-
Madden, S.R.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
17
-
-
11244326497
-
The Sybil attack in sensor networks: Analysis and defenses
-
Berkeley, CA
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proc. IPSN, Berkeley, CA, 2004.
-
(2004)
Proc. IPSN
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
18
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Security, vol. 6, no. 3, pp. 365-403, 2003.
-
(2003)
ACM Trans. Inf. Syst. Security
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
19
-
-
79957465063
-
-
RISE Project [Online]. Available
-
RISE Project [Online]. Available: http://www.cs.ucr.edu/̃rise
-
-
-
-
20
-
-
0042564491
-
Data-centric storage in sensornets with GHT, a geographic hash table
-
S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, "Data-centric storage in sensornets with GHT, a geographic hash table," Mobile Netw. Applicat., vol. 8, no. 4, pp. 427-442, 2003.
-
(2003)
Mobile Netw. Applicat
, vol.8
, Issue.4
, pp. 427-442
-
-
Ratnasamy, S.1
Karp, B.2
Shenker, S.3
Estrin, D.4
Govindan, R.5
Yin, L.6
Yu, F.7
-
21
-
-
51349098378
-
Verifiable privacy-preserving range query in twotiered sensor networks
-
Phoenix, AZ
-
B. Sheng and Q. Li, "Verifiable privacy-preserving range query in twotiered sensor networks," in Proc. IEEE INFOCOM, Phoenix,AZ, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Sheng, B.1
Li, Q.2
-
23
-
-
34347249729
-
Remote softwarebased Attestation for wireless sensors
-
Visegrad, Hungary
-
M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim, "Remote softwarebased Attestation for wireless sensors," in Proc. ESAS, Visegrad, Hungary, 2005.
-
(2005)
Proc. ESAS
-
-
Shaneck, M.1
Mahadevan, K.2
Kher, V.3
Kim, Y.4
-
24
-
-
34547282118
-
TinySeRSync: Secure and resilient time synchronization in wireless sensor networks
-
Alexandria, VA
-
K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, "TinySeRSync: Secure and resilient time synchronization in wireless sensor networks," in Proc. ACM CCS, Alexandria, VA, 2006.
-
(2006)
Proc. ACM CCS
-
-
Sun, K.1
Ning, P.2
Wang, C.3
Liu, A.4
Zhou, Y.5
-
25
-
-
3042738543
-
SWATT: Soft-Ware-based attestation for embedded devices
-
Berkeley, CA
-
A. Seshadri, A. Perrig, L. V. Doorn, and P. Khosla, "SWATT: Soft- Ware-based attestation for embedded devices," in Proc. IEEE S&P, Berkeley, CA, 2004.
-
(2004)
Proc. IEEE S&P
-
-
Seshadri, A.1
Perrig, A.2
Doorn, L.V.3
Khosla, P.4
-
26
-
-
79957511514
-
-
Stargate Gateway (SPB400) [Online]. Available
-
Stargate Gateway (SPB400) [Online]. Available: http://www. xbow.com
-
-
-
-
27
-
-
0001647024
-
Practical network support for IP traceback
-
Stockholm, Sweden
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, Stockholm, Sweden, 2000.
-
(2000)
Proc. ACM SIGCOMM
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
28
-
-
70349690087
-
Secure range queries in tiered sensor networks
-
Rio de Janeiro, Brazil
-
J. Shi, R. Zhang, and Y. Zhang, "Secure range queries in tiered sensor networks," in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
29
-
-
34249805447
-
Top-k monitoring in wireless sensor networks
-
DOI 10.1109/TKDE.2007.1038
-
M. Wu, J. Xu, X. Tang, and W.-C. Lee, "Top-k monitoring in wireless sensor networks," IEEE Trans. Knowl. Data Eng., vol. 19, no. 7, pp. 962-976, Jul. 2007. (Pubitemid 46853313)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.7
, pp. 962-976
-
-
Wu, M.1
Xu, J.2
Tang, X.3
Lee, W.-C.4
-
30
-
-
77955667914
-
Non-interactive pairwise key establishment for sensor networks
-
Sep.
-
C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Non-interactive pairwise key establishment for sensor networks," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 556-569, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 556-569
-
-
Yu, C.-M.1
Lu, C.-S.2
Kuo, S.-Y.3
-
32
-
-
77953304573
-
Verifiable top-k queries in tiered sensor networks
-
San Diego, CA
-
R. Zhang, J. Shi, Y. Liu, and Y. Zhang, "Verifiable top-k queries in tiered sensor networks," in Proc. IEEE INFOCOM, San Diego, CA, 2010.
-
Proc. IEEE INFOCOM
, vol.2010
-
-
Zhang, R.1
Shi, J.2
Liu, Y.3
Zhang, Y.4
-
33
-
-
70450207961
-
Secure multidimensional range queries in sensor networks
-
New Orleans, LA
-
R. Zhang, J. Shi, and Y. Zhang, "Secure multidimensional range queries in sensor networks," in Proc. ACM MobiHoc, New Orleans, LA, 2009.
-
(2009)
Proc. ACM MobiHoc
-
-
Zhang, R.1
Shi, J.2
Zhang, Y.3
|