-
1
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J. and Wagner, D. (2004) Security in wireless sensor networks. Commun. ACM-Special Issue on Wireless Sensor Networks, 47, 53-57.
-
(2004)
Commun. ACM-Special Issue on Wireless Sensor Networks
, vol.47
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
2
-
-
84976699318
-
The byzantine generals problem
-
Lamport, L., Shostak, R.E. and Pease, M.C. (1982) The byzantine generals problem. ACM Trans. Lang. Syst., 4, 382-401.
-
(1982)
ACM Trans. Lang. Syst.
, vol.4
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.E.2
Pease, M.C.3
-
3
-
-
8344236729
-
Highly secure and efficient routing
-
Hong Kong, PR China, March
-
Avramopoulos, I.C., Kobayashi, H., Wang, R. and Krishnamurthy, A. (2004) Highly Secure and Efficient Routing. Proc. 23rd Conf. Comput. Commun., Hong Kong, PR China, March, pp. 197-208.
-
(2004)
Proc. 23rd Conf. Comput. Commun.
, pp. 197-208
-
-
Avramopoulos, I.C.1
Kobayashi, H.2
Wang, R.3
Krishnamurthy, A.4
-
4
-
-
33847297141
-
CountermeasuresAgainst traffic analysis attacks in wireless sensor networks
-
Athens, Greece
-
Deng, J., Han, R. and Mishra, S. (2005) CountermeasuresAgainst Traffic Analysis Attacks in Wireless Sensor Networks. Proc. 1st Int. Conf. Security and Privacy for Emerging Areas in Commun. Netw., Athens, Greece, pp. 113-126.
-
(2005)
Proc. 1st Int. Conf. Security and Privacy for Emerging Areas in Commun. Netw.
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
5
-
-
27944449345
-
Enhancing source- Location privacy in sensor network routing
-
Columbus, OH, USA, November
-
Kamat, U., Zhang, Y. and Ozturk, C. (2005) Enhancing Source- Location Privacy in Sensor Network Routing. Proc. 25th IEEE Int. Conf. Distrib. Comput. Syst., Columbus, OH, USA, November, pp. 599-608.
-
(2005)
Proc. 25th IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 599-608
-
-
Kamat, U.1
Zhang, Y.2
Ozturk, C.3
-
6
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
Beijing, PR China, October
-
Mehta, K., Liu, D. and Wright, M. (2007) Location Privacy in Sensor Networks Against a Global Eavesdropper. Proc. IEEE Int. Conf. Network Protocols, Beijing, PR China, October, pp. 314-323.
-
(2007)
Proc. IEEE Int. Conf. Network Protocols
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
7
-
-
36348975109
-
Triangulation based multi target tracking with mobile sensor networks
-
DOI 10.1109/ROBOT.2007.363979, 4209597, 2007 IEEE International Conference on Robotics and Automation, ICRA'07
-
Kamath, S., Meisner, E. and Isler,V. (2007) Triangulation Based Multi-TargetTracking with Mobile Sensor Networks. Proc. IEEE Int. Conf. Robotics and Automation, Rome, Italy, pp. 3283-3288. (Pubitemid 350140691)
-
(2007)
Proceedings - IEEE International Conference on Robotics and Automation
, pp. 3283-3288
-
-
Kamath, S.1
Meisner, E.2
Isler, V.3
-
8
-
-
37249005313
-
Analysis of location privacy/energy efficiency tradeoffs in wireless sensor networks
-
NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings
-
Armenia, S., Morabito, G. and Palazzo, S. (2007) Analysis of Location Privacy/Energy Efficiency Tradeoffs inWireless Sensor Networks. Proc. 6th Int. IFIP-TC6 Networking Conf. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Atlanta, GA, USA, November, pp. 215-226. (Pubitemid 350271050)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS4479
, pp. 215-226
-
-
Armenia, S.1
Morabito, G.2
Palazzo, S.3
-
9
-
-
79958181865
-
Source-location privacy in wireless sensor networks
-
Lee, S.-W., Park,Y.-H., Son, J.-H., Seo, S.-W., Kang, U., Moon, H.-K. and Lee, M.-S. (2007) Source-location privacy in wireless sensor networks. Korea Inst. Inf. Secur. Cryptol. J., 17, 125-137.
-
(2007)
Korea Inst. Inf. Secur. Cryptol. J.
, vol.17
, pp. 125-137
-
-
Lee, S.-W.1
Park, Y.-H.2
Son, J.-H.3
Seo, S.-W.4
Kang, U.5
Moon, H.-K.6
Lee, M.-S.7
-
10
-
-
51849117757
-
Preserving Source-Location privacy in energy-constrainedwireless sensor networks
-
Beijing, PR China, June
-
Yao, J. and Wen, G. (2008) Preserving Source-Location Privacy in Energy-ConstrainedWireless Sensor Networks. Proc. 28th Int. Conf. Distrib. Comput. Syst.Workshops, Beijing, PR China, June, pp. 412-416.
-
(2008)
Proc. 28th Int. Conf. Distrib. Comput. Syst.Workshops
, pp. 412-416
-
-
Yao, J.1
Wen, G.2
-
11
-
-
14844303406
-
Source-Location privacy in energy-constrained sensor network routing
-
Washington DC, USA, October
-
Ozturk, C., Zhang, Y. and Trappe, W. (2004) Source-Location Privacy in Energy-Constrained Sensor Network Routing. Proc. 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, October, pp. 88-93.
-
(2004)
Proc. 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
12
-
-
33847141964
-
Preserving source location privacy in monitoring-basedwireless sensor networks
-
Rhodes Island, Greece
-
Xi, Y., Schwiebert, L. and Shi, W. (2006) Preserving Source Location Privacy in Monitoring-basedWireless Sensor Networks. Proc. 20th Int. Parallel and Distributed Processing Symp., Rhodes Island, Greece.
-
(2006)
Proc. 20th Int. Parallel and Distributed Processing Symp.
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
13
-
-
78650529079
-
Crash-Tolerant collision-free data aggregation scheduling in wireless sensor networks
-
New Delhi, India
-
Jhumka, A. (2010) Crash-Tolerant Collision-free Data Aggregation Scheduling in Wireless Sensor Networks. Proc. Int. Symp. Reliable Distributed Systems, New Delhi, India.
-
(2010)
Proc. Int. Symp. Reliable Distributed Systems
-
-
Jhumka, A.1
-
15
-
-
79958209545
-
-
JProwler (2010)
-
JProwler (2010). http://w3.isis.vanderbilt.edu/project-s/nest/ jprowler/.
-
-
-
-
16
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Shnayder, V., Hempstead, M., Chen, B., Allen, G.W. and Welsh, M. (2004) Simulating the Power Consumption of Large Scale Sensor Network Applications. Proc. 2nd Int. Conf. Embedded Networked Sensor Syst., Baltimore, MD, USA, May, pp. 188-200. (Pubitemid 41563359)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.-R.3
Allen, G.W.4
Welsh, M.5
|