-
2
-
-
2942524994
-
Location privacy in pervasive computing
-
January
-
A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1), pages 46-55, January 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
4
-
-
27644488112
-
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
-
July-September
-
H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan. On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Transactions on Dependable and Secure Computing, pp. 233-247, July-September, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
7
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
Washington, DC, USA
-
J. Deng, R. Han, and S. Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In Proceedings of the International Conference on Dependable Systems and Networks, pages 637-646, Washington, DC, USA, 2004.
-
(2004)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 637-646
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
21644465692
-
Lightweight security principles for distributed multimedia based sensor networks
-
no., Vol.1, 7-10 Nov.
-
Deepa Kundur, T. Zourntos, N. J. Mathai. Lightweight security principles for distributed multimedia based sensor networks. Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar Conference on , vol.1, no., pp. 368- 372 Vol.1, 7-10 Nov. 2004.
-
(2004)
Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar Conference on
, vol.1
, pp. 368-372
-
-
Kundur, D.1
Zourntos, T.2
Mathai, N.J.3
-
9
-
-
0003358457
-
SPKI Certificate Theory
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory, IETF RFC 2693, September 1999.
-
(1999)
IETF RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
10
-
-
67650697114
-
Why is IPSec a viable option for wireless sensor networks
-
vol., no., Sept. 29 2008-Oct. 2
-
J. Granjal, R. Silva, E. Monteiro, J. Sa Silva, and F. Boavida. Why is IPSec a viable option for wireless sensor networks. Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on , vol., no., pp.802-807, Sept. 29 2008-Oct. 2 2008.
-
(2008)
Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008. 5th IEEE International Conference on
, pp. 802-807
-
-
Granjal, J.1
Silva, R.2
Monteiro, E.3
Sa Silva, J.4
Boavida, F.5
-
11
-
-
4544259863
-
An architecture for privacy-sensitive ubiquitous computing
-
ACM, New York, NY, USA
-
J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing. In Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys '04). ACM, New York, NY, USA, 177-189, 2004.
-
(2004)
Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys '04)
, pp. 177-189
-
-
Hong, J.I.1
Landay, J.A.2
-
12
-
-
33847350601
-
Effective probabilistic approach protecting sensor traffic
-
X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu. Effective probabilistic approach protecting sensor traffic. In Proceedings of the Military Communications Conference, 2005, volume 1, pages 169-175, 2005.
-
(2005)
Proceedings of the Military Communications Conference, 2005
, vol.1
, pp. 169-175
-
-
Hong, X.1
Wang, P.2
Kong, J.3
Zheng, Q.4
Liu, J.5
-
13
-
-
35449007284
-
Preserving location privacy in wireless LANs
-
New York, NY, USA, June ACM Press
-
T. Jiang, H. J. Wang, and Y. C. Hu. Preserving location privacy in wireless LANs. In MobiSys '07: Proceedings of the 5th international conference on Mobile systems, applications and services, pages 246-257, New York, NY, USA, June 2007. ACM Press.
-
(2007)
MobiSys '07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 246-257
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.C.3
-
14
-
-
79960829013
-
AnonySense: Opportunistic and Privacy-Preserving Context Collection
-
th Conference on Pervasive Computing, Sydney, Australia, May 2008, pages 19-22, 2008.
-
(2008)
th Conference on Pervasive Computing, Sydney, Australia, May 2008
, pp. 19-22
-
-
Kapadia, A.1
Peebles, D.2
Cornelius, C.3
Triandopoulos, N.4
Kotz, D.5
-
15
-
-
33749055858
-
Multicast receiver and sender access control and its applicability to mobile IP environments: A survey
-
IEEE, Second Quarter
-
M. Kellil, I. Romdhani, H. Lach, A. Bouabdallah, and H. Betttahar. Multicast receiver and sender access control and its applicability to mobile IP environments: a survey. Communications Surveys & Tutorials, IEEE, vol.7, no.2, pp. 46- 70, Second Quarter 2005.
-
(2005)
Communications Surveys & Tutorials
, vol.7
, Issue.2
, pp. 46-70
-
-
Kellil, M.1
Romdhani, I.2
Lach, H.3
Bouabdallah, A.4
Betttahar, H.5
-
16
-
-
33746084746
-
Security Architecture for the Internet Protocol
-
December
-
S. Kent and K. Seo. Security Architecture for the Internet Protocol, IETF RFC 4301, December 2005.
-
(2005)
IETF RFC
, vol.4301
-
-
Kent, S.1
Seo, K.2
-
17
-
-
67650461985
-
Privacy preservation in wireless sensor networks: A state-of-the-art survey
-
November
-
N. Li, N. Zhang, S. K. Das, and B. Thuraisingham. Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks, Volume 7, Issue 8 (November 2009), pages 1501-1514.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1501-1514
-
-
Li, N.1
Zhang, N.2
Das, S.K.3
Thuraisingham, B.4
-
19
-
-
56749160366
-
Self-certified Sybil-Free Pseudonyms
-
Alexandria, VA, USA
-
st ACM Conference on Wireless Network Security. April 2008, pages 154-159. Alexandria, VA, USA.
-
st ACM Conference on Wireless Network Security. April 2008
, pp. 154-159
-
-
Martucci, L.A.1
Kohlweiss, M.2
Andersson, C.3
Panchenko, A.4
-
21
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
S. Misra and G. Xue. Efficient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks. volume 1(1/2), 2006, pages 50-63.
-
(2006)
International Journal of Sensor Networks
, vol.1
, Issue.1-2
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
22
-
-
52249090009
-
Providing Anonymity in Wireless Sensor Networks
-
Istanbul, Turkey, July 15-20
-
Y. Ouyang, Z. Le, Y. Xu, N. Triandopoulos, S. Zhang, J. Ford, and F. Makedon. Providing Anonymity in Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Pervasive Services, pages 145-148, Istanbul, Turkey, July 15-20, 2007.
-
(2007)
Proceedings of the IEEE International Conference on Pervasive Services
, pp. 145-148
-
-
Ouyang, Y.1
Le, Z.2
Xu, Y.3
Triandopoulos, N.4
Zhang, S.5
Ford, J.6
Makedon, F.7
-
23
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
New York, NY, USA, ACM
-
nd ACM workshop on Security of ad hoc and sensor networks, pages 88-93, New York, NY, USA, 2004. ACM.
-
(2004)
nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
26
-
-
84889498535
-
The Role of Autonomic Networking in Cognitive Networks
-
(ed Q. H. Mahmoud), John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/9780470515143.ch2
-
J. Strassner. The Role of Autonomic Networking in Cognitive Networks, in Cognitive Networks: Towards Self-Aware Networks (ed Q. H. Mahmoud), John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/9780470515143.ch2, 2007.
-
(2007)
Cognitive Networks: Towards Self-Aware Networks
-
-
Strassner, J.1
-
27
-
-
79960764118
-
AnonySense: A system for anonymous opportunistic sensing
-
May
-
M. Shin, C. Cornelius, D. Peebles, A. Kapadia, D. Kotz, and N. Triandopoulos. AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing, May 2010.
-
(2010)
Journal of Pervasive and Mobile Computing
-
-
Shin, M.1
Cornelius, C.2
Peebles, D.3
Kapadia, A.4
Kotz, D.5
Triandopoulos, N.6
-
28
-
-
0035728129
-
Energy efficient routing in wireless sensor networks
-
IEEE , no., vol.1
-
C. Schurgers and M. B. Srivastava. Energy efficient routing in wireless sensor networks. Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE , vol.1, no., pp. 357- 361 vol.1, 2001.
-
(2001)
Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force
, vol.1
, pp. 357-361
-
-
Schurgers, C.1
Srivastava, M.B.2
-
31
-
-
0004125837
-
AAA Authorization Framework
-
August
-
J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross,; B. de Bruijn, C. de Laat, M. Holdrege, and D. Spence. AAA Authorization Framework. IETF RFC 2904, August 2000.
-
(2000)
IETF RFC
, vol.2904
-
-
Vollbrecht, J.1
Calhoun, P.2
Farrell, S.3
Gommans, L.4
Gross, G.5
De Bruijn, B.6
De Laat, C.7
Holdrege, M.8
Spence, D.9
-
32
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
Y. Xi, L. Schwiebert, and W. Shi. Preserving source location privacy in monitoring-based wireless sensor networks. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium, Los Alamitos, CA, USA, 2006.
-
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, Los Alamitos, CA, USA, 2006
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
|