-
2
-
-
34247397108
-
Secure code distribution in dynamically programmable wireless sensor networks
-
San Francisco, CA, USA
-
Deng, J., Han, R. and Mishra, S. (2006) 'Secure code distribution in dynamically programmable wireless sensor networks', Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN'06), San Francisco, CA, USA, pp.292-300.
-
(2006)
Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN'06)
, pp. 292-300
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
3
-
-
34247376029
-
Securing the deluge network programming system
-
San Francisco, CA, USA
-
Dutta, P., Hui, J., Chu, D. and Culler, D. (2006) 'Securing the deluge network programming system', Proceeding of the 5th International Conference on Information Processing in Sensor Networks (IPSN'06), San Francisco, CA, USA, pp.326-333.
-
(2006)
Proceeding of the 5th International Conference on Information Processing in Sensor Networks (IPSN'06)
, pp. 326-333
-
-
Dutta, P.1
Hui, J.2
Chu, D.3
Culler, D.4
-
4
-
-
0037702249
-
The nesC language: A holistic approach to networked embedded systems
-
ACM, New York, NY, USA
-
Gay, D., Levis, P., von Behren, R., Welsh, M., Brewer, E. and Culler, D. (2003) 'The nesC language: a holistic approach to networked embedded systems', Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI'03), ACM, New York, NY, USA, pp.1-11.
-
(2003)
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI'03)
, pp. 1-11
-
-
Gay, D.1
Levis, P.2
Von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
6
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Cambridge, MA, USA
-
Gura, N., Patel, A., Wander, A., Eberle, H. and Shantz, S.C. (2004) 'Comparing elliptic curve cryptography and RSA on 8-bit CPUs', Proceedings of the Cryptographic Hardware and Embedded Systems (CHES'04), Cambridge, MA, USA, pp.119-132.
-
(2004)
Proceedings of the Cryptographic Hardware and Embedded Systems (CHES'04)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
7
-
-
0034445661
-
System architecture directions for networked sensors
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. and Pister, K. (2000) 'System architecture directions for networked sensors', ACM SIGPLAN Notices, Vol. 35, pp.93-104. (Pubitemid 32474159)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
8
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Hui, J.W. and Culler, D. (2004) 'The dynamic behavior of a data dissemination protocol for network programming at scale', Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, pp.81-94. (Pubitemid 41563351)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
9
-
-
33749604819
-
Authenticated in-network programming for wireless sensor networks
-
Ad-Hoc, Mobile, and Wireless Networks - 5th International Conference, ADHOC-NOW 2006, Proceedings
-
Krontiris, I. and Dimitriou, T. (2006a) 'Authenticated in-network programming for wireless sensor networks', Proceedings of the 5th International Conference on AD-HOC Networks & Wireless (ADHOC-NOW'06), Ottawa, Canada, pp.390-403. (Pubitemid 44543222)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4104
, pp. 390-403
-
-
Krontiris, I.1
Dimitriou, T.2
-
10
-
-
79959704133
-
A practical authentication scheme for in-network programming in wireless sensor networks
-
Uppsala, Sweden
-
Krontiris, I. and Dimitriou, T. (2006b) 'A practical authentication scheme for in-network programming in wireless sensor networks', Proceedings of the 2nd ACM Workshop on Real- World Wireless Sensor Networks (REALWSN'06), Uppsala, Sweden, pp.13-17.
-
(2006)
Proceedings of the 2nd ACM Workshop on Real- World Wireless Sensor Networks (REALWSN'06)
, pp. 13-17
-
-
Krontiris, I.1
Dimitriou, T.2
-
11
-
-
33947642085
-
Sluice: Secure dissemination of code updates in sensor networks
-
Lisbon, Portugal
-
Lanigan, P.E., Gandhi, R. and Narasimhan, P. (2006) 'Sluice: secure dissemination of code updates in sensor networks', Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), Lisbon, Portugal, p.53.
-
(2006)
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
, pp. 53
-
-
Lanigan, P.E.1
Gandhi, R.2
Narasimhan, P.3
-
12
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
St. Louis, MO, USA
-
Liu, A. and Ning, P. (2008) 'TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks', Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08), St. Louis, MO, USA, pp.245-256.
-
(2008)
Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08)
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
13
-
-
51249084232
-
Secure and DoS-resistant code dissemination in wireless sensor networks using Seluge
-
St. Louis, MO, USA
-
Liu, A., Oh, Y-H. and Ning, P. (2008) 'Secure and DoS-resistant code dissemination in wireless sensor networks using Seluge', Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08), St. Louis, MO, USA, pp.561-562.
-
(2008)
Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08)
, pp. 561-562
-
-
Liu, A.1
Oh, Y.-H.2
Ning, P.3
-
14
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Springer-Verlag, London, UK
-
Merkle, R. (1988) 'A digital signature based on a conventional encryption function', Advances in Cryptology -CRYPTO'87 (Lecture Notes in Computer Science, Vol. 293), Springer- Verlag, London, UK, pp.369-378.
-
(1988)
Advances in Cryptology -CRYPTO'87 (Lecture Notes in Computer Science 293)
, pp. 369-378
-
-
Merkle, R.1
-
15
-
-
34548472878
-
Multiple-time signature schemes against adaptive chosen message attacks
-
Ottawa, Canada
-
Pieprzyk, J., Wang, H. and Xing, C. (2003) 'Multiple-time signature schemes against adaptive chosen message attacks', Proceedings of the Selected Areas in Cryptography (SAC 2003), Ottawa, Canada, pp.88-100.
-
(2003)
Proceedings of the Selected Areas in Cryptography (SAC 2003)
, pp. 88-100
-
-
Pieprzyk, J.1
Wang, H.2
Xing, C.3
-
16
-
-
84947431932
-
Better than BiBa: Short onetime signatures with fast signing and verifying
-
Springer-Verlag London, UK
-
Reyzin, L. and Reyzin, N. (2002) 'Better than BiBa: Short onetime signatures with fast signing and verifying', Proceedings of the 7th Australian Conference on Information Security and Privacy (ACISP'02), Springer-Verlag, London, UK, pp.144-153.
-
(2002)
Proceedings of the 7th Australian Conference on Information Security and Privacy (ACISP'02)
, pp. 144-153
-
-
Reyzin, L.1
Reyzin, N.2
-
17
-
-
44349158878
-
Confidential and secure broadcast in wireless sensor networks
-
Athens, Greece
-
Shaheen, J., Ostry, D., Sivaraman, V. and Jha, S. (2007) 'Confidential and secure broadcast in wireless sensor networks', Proceedings of the IEEE Personal, Indoor, and Mobile Radio Communications (PIMRC'07), Athens, Greece.
-
(2007)
Proceedings of the IEEE Personal, Indoor, and Mobile Radio Communications (PIMRC'07)
-
-
Shaheen, J.1
Ostry, D.2
Sivaraman, V.3
Jha, S.4
-
18
-
-
6444242510
-
-
Technical Report CENS-TR-30, Center for Embedded Networked Computing University of California Los Angeles, CA, USA
-
Stathopoulos, T., Heidemann, J. and Estrin, D. (2003) A Remote Code Update Mechanism for Wireless Sensor Networks, Technical Report CENS-TR-30, Center for Embedded Networked Computing, University of California, Los Angeles, CA, USA.
-
(2003)
A Remote Code Update Mechanism for Wireless Sensor Networks
-
-
Stathopoulos, T.1
Heidemann, J.2
Estrin, D.3
-
19
-
-
70349103341
-
A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks
-
ACM, New York, NY, USA
-
Tan, H., Ostry, D., Zic, J. and Jha, S. (2009) 'A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks', Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec'09), ACM, New York, NY, USA, pp.245-252.
-
(2009)
Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec'09)
, pp. 245-252
-
-
Tan, H.1
Ostry, D.2
Zic, J.3
Jha, S.4
-
20
-
-
70349122119
-
A rom-friendly secure code update mechanism for wsns using a statefulverifier τ-time signature scheme
-
ACM, New York, NY, USA
-
Ugus, O., Westhoff, D. and Bohli, J-M. (2009) 'A ROM-friendly secure code update mechanism for WSNs using a statefulverifier ?-time signature scheme', Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec'09), ACM, New York, NY, USA, pp.29-40.
-
(2009)
Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec'09)
, pp. 29-40
-
-
Ugus, O.1
Westhoff, D.2
Bohli, J.-M.3
-
21
-
-
33745115947
-
Reprogramming wireless sensor networks: Challenges and approaches
-
DOI 10.1109/MNET.2006.1637932
-
Wang, Q., Zhu, Y. and Cheng, L. (2006) 'Reprogramming wireless sensor networks: challenges and approaches', IEEE Network, Vol. 20, pp.48-55. (Pubitemid 43885287)
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 48-55
-
-
Wang, Q.1
Zhu, Y.2
Cheng, L.3
|