-
3
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
New York, USA. ACM
-
C. Karlof, N. Sastry, and D. Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162-175, New York, USA, 2004. ACM.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
5
-
-
55649095270
-
Location privacy and anonymity preserving routing for wireless sensor networks
-
A. A. Nezhad, A. Miri, and D. Makrakis. Location privacy and anonymity preserving routing for wireless sensor networks. Computer Networks, 52(18):3433-3452, 2008.
-
(2008)
Computer Networks
, vol.52
, Issue.18
, pp. 3433-3452
-
-
Nezhad, A.A.1
Miri, A.2
Makrakis, D.3
-
6
-
-
70249120775
-
Source location privacy against laptop-class attacks in sensor networks
-
New York, USA. ACM
-
Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon. Source location privacy against laptop-class attacks in sensor networks. In Proceedings of the 4th international conference on Security and privacy in communication netowrks, pages 1-10, New York, USA, 2008. ACM.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks
, pp. 1-10
-
-
Ouyang, Y.1
Le, Z.2
Liu, D.3
Ford, J.4
Makedon, F.5
-
7
-
-
57849119211
-
Serp: Secure energy-efficient routing protocol for densely deployed wireless sensor networks
-
A.-S. K. Pathan and C. S. Hong. Serp: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Annales des Téĺecommunications, 63(9-10):529-541, 2008.
-
(2008)
Annales des Télécommunications
, vol.63
, Issue.9-10
, pp. 529-541
-
-
Pathan, A.-S.K.1
Hong, C.S.2
-
8
-
-
33749382575
-
Energy comparison of aes and sha-1 for ubiquitous computing
-
IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2006). Springer
-
J. peter Kaps and B. Sunar. Energy comparison of aes and sha-1 for ubiquitous computing. In IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2006), LNCS. Springer, 2006.
-
(2006)
LNCS
-
-
Peter Kaps, J.1
Sunar, B.2
-
9
-
-
0345851235
-
Wireless integrated network sensors
-
G. J. Pottie and W. J. Kaiser. Wireless integrated network sensors. Communications of ACM, 43(5):51-58, 2000.
-
(2000)
Communications of ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
10
-
-
58449099938
-
Taxonomy of security attacks in sensor networks and countermeasures
-
Hanoi, Vietnam, December
-
T. Roosta, S. Shieh, and S. Sastry. Taxonomy of security attacks in sensor networks and countermeasures. In The First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam, December 2006.
-
(2006)
The First IEEE International Conference on System Integration and Reliability Improvements
-
-
Roosta, T.1
Shieh, S.2
Sastry, S.3
-
11
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
April
-
M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards statistically strong source anonymity for sensor networks. In INFOCOM 2008, The 27th Conference on Computer Communications, pages 51-55, April 2008.
-
(2008)
INFOCOM 2008, the 27th Conference on Computer Communications
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
12
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
H. Wang, B. Sheng, and Q. Li. Privacy-aware routing in sensor networks. Computer Networks, 53(9):1512-1529, 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
13
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
New York, USA. ACM
-
R. Watro, D. Kong, S.-f. Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59-64, New York, USA, 2004. ACM.
-
(2004)
SASN '04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.-F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
14
-
-
34548852836
-
Chemas: Identify suspect nodes in selective forwarding attacks
-
B. Xiao, B. Yu, and C. Gao. Chemas: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11):1218-1230, 2007.
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, Issue.11
, pp. 1218-1230
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
15
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
New York, NY, USA
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao. Towards event source unobservability with minimum network traffic in sensor networks. In WiSec '08: Proceedings of the first ACM conference on Wireless network security, pages 77-88, New York, NY, USA, 2008.
-
(2008)
WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
|