-
1
-
-
5444275208
-
Wireless sensor and actor networks: Research challenges
-
10.1016/j.adhoc.2004.04.003
-
I. F. Akyildiz I. H. Kasimoglu 2004 Wireless sensor and actor networks: Research challenges Ad Hoc Networks Journal 2 4 351 367 10.1016/j.adhoc.2004.04. 003
-
(2004)
Ad Hoc Networks Journal
, vol.2
, Issue.4
, pp. 351-367
-
-
Akyildiz, I.F.1
Kasimoglu, I.H.2
-
2
-
-
85032779250
-
Secure sensor information management and mining
-
10.1109/MSP.2004.1296538
-
B. Thuraisingham 2004 Secure sensor information management and mining IEEE Signal Processing Magazine 21 3 14 19 10.1109/MSP.2004.1296538
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.3
, pp. 14-19
-
-
Thuraisingham, B.1
-
3
-
-
70349682512
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
Yu, S.; Ren, K.; & Lou, W. (2009). FDAC: Toward fine-grained distributed data access control in wireless sensor networks. In Proceeding IEEE INFOCOM, pp. 963-971.
-
(2009)
Proceeding IEEE INFOCOM
, pp. 963-971
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
4
-
-
0036949025
-
A two-tier data dissemination model for large-scale wireless sensor networks
-
Ye, F.; Luo, H.; Cheng, H.; Lu, S.; & Zhang, L. (2002). A two-tier data dissemination model for large-scale wireless sensor networks. In Proceeding ACM Mobicom, pp. 148-159.
-
(2002)
Proceeding ACM Mobicom
, pp. 148-159
-
-
Ye, F.1
Luo, H.2
Cheng, H.3
Lu, S.4
Zhang, L.5
-
6
-
-
33745820773
-
Trust management for resilient wireless sensor networks
-
DOI 10.1007/11734727-7, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers
-
Hur, J.; Lee, Y.; Hong, S.; & Yoon, H. (2006). Trust management for resilient wireless sensor networks. In Proceeding ICISC, LNCS, vol. 3935, pp. 56-68. (Pubitemid 44029524)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3935
, pp. 56-68
-
-
Hur, J.1
Lee, Y.2
Hong, S.-M.3
Yoon, H.4
-
8
-
-
34547487841
-
Capsule: An energy-optimized object storage system for memory-constrained sensor devices
-
Mathur, G.; Desnoyers, P.; Ganesan, D.; & Shenoy, P. (2006). Capsule: An energy-optimized object storage system for memory-constrained sensor devices. In Proceeding ACM Sensys.
-
(2006)
Proceeding ACM Sensys
-
-
Mathur, G.1
Desnoyers, P.2
Ganesan, D.3
Shenoy, P.4
-
9
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
Vimercati, S.; Foresti, S.; Jajodia, S.; Paraboschi, S.; & Samarati, P. (2007). A data outsourcing architecture combining cryptography and access control. In Proceeding ACM CSAW.
-
(2007)
Proceeding ACM CSAW.
-
-
Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
35648972648
-
Securing distributed data storage and retrieval in sensor networks
-
Subramanian, N.; Yang, C.; & Zhang, W. (2007). Securing distributed data storage and retrieval in sensor networks. In Proceeding PerCom.
-
(2007)
Proceeding PerCom
-
-
Subramanian, N.1
Yang, C.2
Zhang, W.3
-
11
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai, A.; & Waters, B. (2005). Fuzzy identity-based encryption. In Proceeding Eurocrypt, pp. 457-473. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
12
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Goyal, V.; Pandey, O.; Sahai, A.; & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceeding ACM conference on computer and communications security, pp. 89-98. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Bethencourt, J.; Sahai, A.; & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceeding IEEE symposium on security and privacy, pp. 321-334. (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
17
-
-
0345565893
-
A survey of key management for secure group communication
-
10.1145/937503.937506
-
S. Rafaeli D. Hutchison 2003 A survey of key management for secure group communication ACM Computing Surveys 35 3 309 329 10.1145/937503.937506
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
18
-
-
39049153474
-
Using attribute-based access control to enable attribute-based messaging
-
Bobba, R.; Fatemieh, O.; Khan, F.; Gunter, C. A.; & Khurana, H. (2006). Using attribute-based access control to enable attribute-based messaging. In Proceeding annual computer security applications conference.
-
(2006)
Proceeding Annual Computer Security Applications Conference
-
-
Bobba, R.1
Fatemieh, O.2
Khan, F.3
Gunter . C, A.4
Khurana, H.5
-
19
-
-
79957599737
-
Ciphertext policy attribute based encryption with efficient revocation
-
University of Waterloo. AccessedMarch2010
-
Liang, X.; Lu, R.; Lin, X.; & Shen, X. (2010). Ciphertext policy attribute based encryption with efficient revocation. Technical Report. University of Waterloo. http://bbcr.uwaterloo.ca/~x27liang/papers/ abe%20with%20revocation.pdf. Accessed March 2010.
-
(2010)
Technical Report
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.4
-
20
-
-
76649143738
-
Mediated ciphertext-policy attribute-based encryption and its application
-
Ibraimi, L.; Petkovic, M.; Nikova, S.; Hartel, P.; & Jonker, W. (2009). Mediated ciphertext-policy attribute-based encryption and its application. In Proceeding WISA, LNCS, vol. 5932, pp. 309-323.
-
(2009)
Proceeding WISA, LNCS
, vol.5932
, pp. 309-323
-
-
Ibraimi, L.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
21
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
Yu, S.; Wang, C.; Ren, K.; & Lou, W. (2010). Attribute based data sharing with attribute revocation. In Proceeding ASIACCS.
-
(2010)
Proceeding ASIACCS
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
22
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
Vimercati, S. D. C.; Foresti, S.; Jajodia, S.; Paraboschi, S.; & Samarati, P. (2007). Over-encryption: Management of access control evolution on outsourced data. In Proceeding VLDB.
-
(2007)
Proceeding VLDB
-
-
Vimercati . . D S, C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
23
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
Mittra, S. (1997) Iolus: A framework for scalable secure multicasting. In Proceeding ACM SIGCOMM, pp. 277-288. (Pubitemid 127568367)
-
(1997)
Computer Communication Review
, vol.27
, Issue.4
, pp. 277-288
-
-
Mittra, S.1
-
24
-
-
0034318740
-
Scalable secure one-to-many group communication using dual encryption
-
DOI 10.1016/S0140-3664(00)00255-3
-
L. Dondeti S. Mukherjee A. Samal 1999 Scalable secure one-to-many group communication using dual encryption Computer Communication 23 1681 1701 10.1016/S0140-3664(00)00255-3 (Pubitemid 32033569)
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1681-1701
-
-
Dondeti, L.R.1
Mukherjee, S.2
Samal, A.3
-
25
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Advances in Cryptology - CRYPTO 2001
-
Naor, D.; Naor, M.; & Lotspiech, J. (2001). Revocation and tracing schemes for stateless receivers. In Proceeding CRYPTO, LNCS, vol. 2139, pp. 41-62. (Pubitemid 33317907)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
26
-
-
0242341057
-
Multicast group behavior in the internet's multicast backbone (MBone)
-
K. C. Almeroth M. H. Ammar 1997 Multicast group behavior in the Internet's multicast backbone (MBone) IEEE Communication Magazine 35 124 129 10.1109/35.587716 (Pubitemid 127648436)
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.6
, pp. 124-129
-
-
Almeroth, K.C.1
Ammar, M.H.2
-
28
-
-
77955015028
-
TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks
-
Xiong, X.; Wong, d. S.; & Deng. X. (2010). TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. In Proceeding IEEE WCNC 2010.
-
(2010)
Proceeding IEEE WCNC 2010
-
-
Xiong, X.1
Wong, D.S.2
Deng, X.3
-
29
-
-
78751642743
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
10.1016/j.comcom.2010.05.013
-
L. B. Oliveira D. F. Aranha C. P. L. Gouvea M. Scott D. F. Camara J. Lopez R. Dahab 2011 TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks Computer Communications 34 485 493 10.1016/j.comcom.2010.05.013
-
(2011)
Computer Communications
, vol.34
, pp. 485-493
-
-
Oliveira, L.B.1
Aranha, D.F.2
Gouvea, C.P.L.3
Scott, M.4
Camara, D.F.5
Lopez, J.6
Dahab, R.7
-
30
-
-
84983187647
-
-
AccessedJune2010
-
TinyECC Library. http://discovery.csc.ncsu.edu/software/TinyECC/index. html. Accessed June 2010.
-
TinyECC Library
-
-
-
31
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
1030.68814 10.1023/A:1016598314198
-
A. Perrig R. Szewczyk V. Wen D. Culler J.D. Tygar 2002 SPINS: Security protocols for sensor networks Wireless Networks 8 521 534 1030.68814 10.1023/A:1016598314198
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
|