-
1
-
-
77954855458
-
G-sense: A scalable architecture for global sensing and monitoring
-
10.1109/MNET.2010.5510920
-
A. J. Perez M. A. Labrador S. J. Barbeau 2010 G-sense: A scalable architecture for global sensing and monitoring IEEE Network 24 4 57 64 10.1109/MNET.2010.5510920
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 57-64
-
-
Perez, A.J.1
Labrador, M.A.2
Barbeau, S.J.3
-
3
-
-
68949188091
-
Network virtualization: State of the art and research challenges
-
10.1109/MCOM.2009.5183468
-
N. M. Mosharaf Kabir Chowdhury R. Boutaba 2009 Network virtualization: State of the art and research challenges IEEE Communications Magazine 47 7 20 26 10.1109/MCOM.2009.5183468
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.7
, pp. 20-26
-
-
Mosharaf Kabir Chowdhury, N.M.1
Boutaba, R.2
-
8
-
-
18744383508
-
-
uIP TCP/IP stack, http://www.sics.se/~adam/uip/index.php/Main-Page.
-
UIP TCP/IP Stack
-
-
-
9
-
-
33746690237
-
-
Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944.
-
(2007)
Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
11
-
-
84866510364
-
IP is dead, long live IP for wireless sensor networks
-
USA
-
Hui, J. W., Culler, D. (2008). IP is dead, long live IP for wireless sensor networks. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys '08 (pp. 15-28). USA.
-
(2008)
Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys '08
, pp. 15-28
-
-
Hui, J.W.1
Culler, D.2
-
12
-
-
77955719122
-
IPSA: A novel architecture design for integrating IP and sensor networks
-
10.1504/IJSNET.2009.023315
-
M. Chen S. Mao Y. Xiao M. Li V.C.M. Leung 2008 IPSA: A novel architecture design for integrating IP and sensor networks International Journal of Sensor Networks 5 1 48 57 10.1504/IJSNET.2009.023315
-
(2008)
International Journal of Sensor Networks
, vol.5
, Issue.1
, pp. 48-57
-
-
Chen, M.1
Mao, S.2
Xiao, Y.3
Li, M.4
Leung, V.C.M.5
-
17
-
-
67650291019
-
Analysis of public-key cryptography for wireless sensor networks security
-
Amin, F., Jahangir, A. H., & Rasifard, H. (2008). Analysis of public-key cryptography for wireless sensor networks security. In: Proceedings of World Academy of Science, Engineering and Technology. (Vol. 31).
-
(2008)
Proceedings of World Academy of Science, Engineering and Technology
, vol.31
-
-
Amin, F.1
Jahangir, A.H.2
Rasifard, H.3
-
18
-
-
37149040069
-
Enabling full-size public-key algorithms on 8-bit sensor nodes
-
LNCS
-
Uhsadel, L., Poschmann, A., & Paar, C. (2007). Enabling full-size public-key algorithms on 8-bit sensor nodes. In: Proceedings of ESAS 2007, (Vol. 4572 of LNCS, pp. 73-86).
-
(2007)
Proceedings of ESAS 2007
, vol.4572
, pp. 73-86
-
-
Uhsadel, L.1
Poschmann, A.2
Paar, C.3
-
19
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
DOI 10.1145/1180345.1180366, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
Piotrowski, K., Langendoerfer, P., & Peter, S. (2006). How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (pp. 169-176). USA (Pubitemid 47168568)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
21
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu, S., Setia, S., Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, USA (pp. 62-72) (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
22
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
Chan, H., Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE INFOCOM, (Vol. 1, pp. 524-535). (Pubitemid 41390848)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
24
-
-
70449509166
-
An information driven sensornet architecture
-
De Poorter, E., Moerman, I., Demeester, P. (2009). An information driven sensornet architecture. In: Proceedings of The Third International Conference on Sensor Technologies and Applications, SensorComm.
-
(2009)
Proceedings of the Third International Conference on Sensor Technologies and Applications, SensorComm
-
-
De Poorter, E.1
Moerman, I.2
Demeester, P.3
|