-
1
-
-
79957819574
-
A semantic enriched data model for sensor network interoperability
-
(in Press) Elsevier
-
F. Amato, V. Casola, A. Gaglione, A. Mazzeo,A semantic enriched data model for sensor network interoperability, In Simulation Modelling Practice and Theory, 2010, (in Press) Elsevier.
-
(2010)
Simulation Modelling Practice and Theory
-
-
Amato, F.1
Casola, V.2
Gaglione, A.3
Mazzeo, A.4
-
2
-
-
79960799979
-
Vineyard computing: Sensor networks in agricultural production
-
IEEE, March
-
T. Brooke, J. Burrel, and T. Beckwit, Vineyard computing: Sensor networks in agricultural production, In Pervasive Computing Magazine, pages 3845. IEEE, March 2004.
-
(2004)
Pervasive Computing Magazine
, pp. 3845
-
-
Brooke, T.1
Burrel, J.2
Beckwit, T.3
-
3
-
-
70350779958
-
A reference architecture for sensor networks integration and management
-
V. Casola, A. Gaglione, and A. Mazzeo, A reference architecture for sensor networks integration and management, 2009. In IEEE Proceedings of GSN09, Oxford, July 2009.
-
(2009)
IEEE Proceedings of GSN09, Oxford, July 2009
-
-
Casola, V.1
Gaglione, A.2
Mazzeo, A.3
-
4
-
-
1542265644
-
-
Certicom Research Version 1.0, September 20, Certicom Research. Standards for efficient cryptography
-
Certicom Research, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography", Version 1.0, September 20, 2000. Certicom Research. Standards for efficient cryptography.
-
(2000)
Standards for Efficient Cryptography, SEC 1: Elliptic Curve Cryptography
-
-
-
5
-
-
79960819453
-
A Secure Architecture for Re-Taskable Sensing Systems
-
A.De Benedictis, A. Gaglione and N. Mazzocca, A Secure Architecture for Re-Taskable Sensing Systems, In Journal of Information Assurance and Security, Volume 6 , pp. 240-247, 2011.
-
(2011)
Journal of Information Assurance and Security
, vol.6
, pp. 240-247
-
-
De Benedictis, A.1
Gaglione, A.2
Mazzocca, N.3
-
6
-
-
0141692556
-
Detection, classification, and tracking in distributed sensor networks
-
IEEE, March
-
Y. Hu D. Li, K.Wong and A. Sayeed,Detection, classification, and tracking in distributed sensor networks, In IEEE Signal Processing Magazine, pages 1729. IEEE, March 2002.
-
(2002)
IEEE Signal Processing Magazine
, pp. 1729
-
-
Hu, Y.1
Li, D.2
Wong, K.3
Sayeed, A.4
-
7
-
-
26444574670
-
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks
-
C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, In Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
-
Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
8
-
-
35348897342
-
MiniSec: A Secure Sensor Network Communication Architecture
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, MiniSec: A Secure Sensor Network Communication Architecture, In Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN 2007), April 2007.
-
Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN 2007), April 2007
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
9
-
-
79960787337
-
Sensor Web Enablement: Overview and High Level Architecture
-
Open Geospatial Consortium Inc., (in Press) Elsevier.OGC OpenGIS White Paper,2007
-
Open Geospatial Consortium Inc., Sensor Web Enablement: Overview And High Level Architecture, In Simulation Modelling Practice and Theory, 2010, (in Press) Elsevier.OGC OpenGIS White Paper,2007
-
(2010)
Simulation Modelling Practice and Theory
-
-
-
10
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler,Spins: security protocols for sensor networks, In ACM Wireless Networking, VIII (5), pp. 521-534, 2002
-
(2002)
ACM Wireless Networking
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.A. Adleman, A method for obtaining digital signatures and public-key cryptosystems, In Communications of the ACM XXI (2), pp. 120-126, 1998.
-
(1998)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
12
-
-
0034772382
-
Research challenges in wireless networks of biomedical sensors
-
L. Schwiebert, S. K. S. Gupta, and J. Weinmann, Research challenges in wireless networks of biomedical sensors, In Proceedings of ACM/IEEE MOBICOM 01, pp. 151 -165, 2001.
-
(2001)
Proceedings of ACM/IEEE MOBICOM 01
, pp. 151-165
-
-
Schwiebert, L.1
Gupta, S.K.S.2
Weinmann, J.3
-
13
-
-
0034543874
-
Research challenges in environmental observation and forecasting systems
-
D. Steere, A. Baptista, D. McNamee, C. Pu, J. Walpole,Research challenges in environmental observation and forecasting systems, In Proceedings of ACM/IEEE MOBICOM 00, Boston, August 2000.
-
Proceedings of ACM/IEEE MOBICOM 00, Boston, August 2000
-
-
Steere, D.1
Baptista, A.2
McNamee, D.3
Pu, C.4
Walpole, J.5
-
14
-
-
79960780867
-
Application of Wireless Sensor Networks to Automobiles
-
IEEE, March
-
J. Tavares, F. J. Velez, J. M. Ferro, Application of Wireless Sensor Networks to Automobiles, In Pervasive Computing Magazine, pages 3845. IEEE, March 2004.
-
(2004)
Pervasive Computing Magazine
, pp. 3845
-
-
Tavares, J.1
Velez, F.J.2
Ferro, J.M.3
-
15
-
-
34250697329
-
-
URL
-
TinyOS Project, URL: http://www.tinyos.net.
-
TinyOS Project
-
-
-
16
-
-
51349093348
-
-
Technical report, Oct. 30
-
H. Wang, B. Sheng, C.C. Tan and Qun Li, WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes, Technical report, Oct. 30, 2007
-
(2007)
WM-ECC: An Elliptic Curve Cryptography Suite on Sensor Motes
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
17
-
-
85008955601
-
Efficient Implementation of Public Key Cryptosystems on Mote Sensors
-
H. Wang and Q. Lin, Efficient Implementation of Public Key Cryptosystems on Mote Sensors, In Proceedings of the 8th International Conference on Information and Communications Security (ICICS 2006), Raleigh, North Carolina, USA. December 2006, pp. 519-528.
-
Proceedings of the 8th International Conference on Information and Communications Security (ICICS 2006), Raleigh, North Carolina, USA. December 2006
, pp. 519-528
-
-
Wang, H.1
Lin, Q.2
-
18
-
-
0026836188
-
Mediators in the Architecture of Future Information Systems
-
G. Wiederhold, Mediators in the Architecture of Future Information Systems, In IEEE Computer XXV(3), pp. 38-49, 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.3
, pp. 38-49
-
-
Wiederhold, G.1
-
19
-
-
62549121725
-
-
ZigBee Alliance, Technical Report Document 053474r06, Version 1.0, ZigBee Alliance, June
-
ZigBee Alliance, Zigbee specification,Technical Report Document 053474r06, Version 1.0, ZigBee Alliance, June 2005.
-
(2005)
Zigbee Specification
-
-
|