-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey", International Journal of Computer Networks, Elsevier Publications, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
International Journal of Computer Networks, Elsevier Publications
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
78549260205
-
Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802. 11 Wireless Mesh Networks
-
Tahir Naeem, Kok-Keong Loo, "Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802. 11 Wireless Mesh Networks", International Journal of Digital Content Technology and its Applications (JDCTA), AICIT Publications, vol. 3, no. 1, pp. 88-93, 2009.
-
(2009)
International Journal of Digital Content Technology and its Applications (JDCTA), AICIT Publications
, vol.3
, Issue.1
, pp. 88-93
-
-
Naeem, T.1
Loo, K.-K.2
-
4
-
-
78651548980
-
Overview of Routing in Dynamic Wireless Sensor Networks
-
Huang Zhi, Liu San-Yang, Qi Xiao-Gang, "Overview of Routing in Dynamic Wireless Sensor Networks", International Journal of Digital Content Technology and its Applications (JDCTA), AICIT Publications, vol. 4, no. 4, pp. 199-206, 2010.
-
(2010)
International Journal of Digital Content Technology and its Applications (JDCTA), AICIT Publications
, vol.4
, Issue.4
, pp. 199-206
-
-
Zhi, H.1
San-Yang, L.2
Xiao-Gang, Q.3
-
5
-
-
84874468531
-
Data aggregation techniques in sensor networks: A survey
-
Ramesh Rajagopalan and Pramod K. Varshney, "Data aggregation techniques in sensor networks: A survey", Comm. Surveys Tutorials, IEEE Publications, vol. 8, no. 4, pp. 48-63, 2006.
-
(2006)
Comm. Surveys Tutorials, IEEE Publications
, vol.8
, Issue.4
, pp. 48-63
-
-
Rajagopalan, R.1
Varshney, P.K.2
-
6
-
-
0030577321
-
A new privacy homomorphism and applications
-
Josep Ferrer and Domingo, "A new privacy homomorphism and applications", Inf. Process. Lett., vol. 60, no. 5, pp. 277-282, 1996.
-
(1996)
Inf. Process. Lett
, vol.60
, Issue.5
, pp. 277-282
-
-
Ferrer, J.1
Domingo2
-
7
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
In, London, UK, Springer-Verlag
-
Domingo-Ferrer and Joseph, "A provably secure additive and multiplicative privacy homomorphism", In Proceedings of the 5th International Conference on Information Security, London, UK, Springer-Verlag, pp. 471-483, 2002.
-
(2002)
Proceedings of the 5th International Conference on Information Security
, pp. 471-483
-
-
Domingo-Ferrer1
Joseph2
-
8
-
-
34248662954
-
In-network aggregation techniques for wireless sensor networks: A survey
-
Elena Fasolo, Michele Rossi, Jorg Widmer, and Michele Zorzi, "In-network aggregation techniques for wireless sensor networks: a survey", Wireless Communication, IEEE Publications, vol. 14, no. 2, pp. 70-87, 2007.
-
(2007)
Wireless Communication, IEEE Publications
, vol.14
, Issue.2
, pp. 70-87
-
-
Fasolo, E.1
Rossi, M.2
Widmer, J.3
Zorzi, M.4
-
9
-
-
84871210733
-
Secure data aggregation in wireless sensor network: A survey
-
Alzaid Hani, Foo Ernest and Nieto Juan Gonzalez, "Secure data aggregation in wireless sensor network: a survey", In Proceedings of the sixth Australasian conference on Information security (AISC '08), Australian Computer Society, pp. 93-105, 2008.
-
(2008)
Proceedings of the sixth Australasian conference on Information security (AISC '08), Australian Computer Society
, pp. 93-105
-
-
Hani, A.1
Ernest, F.2
Gonzalez, N.J.3
-
10
-
-
33749525209
-
Effcient aggregation of encrypted data in wireless sensor networks
-
Claude Castelluccia, Einar Mykletun, and Gene Tsudik, "Effcient aggregation of encrypted data in wireless sensor networks", In Proceedings of the MOBIQUITOUS, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, IEEE Computer Society, pp. 109-117, 2005.
-
(2005)
Proceedings of the MOBIQUITOUS, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, IEEE Computer Society
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
11
-
-
36348942851
-
On Concealed Data Aggregation for Wireless Sensor Networks
-
Steffen Peter, Peter Langendoerfer, and Krzysztof Piotrowski, "On Concealed Data Aggregation for Wireless Sensor Networks", In Proceedings of the Fourth IEEE Consumer Comm. and Networking Conf. (CCNC), pp. 192-196, 2007.
-
(2007)
Proceedings of the Fourth IEEE Consumer Comm. and Networking Conf. (CCNC)
, pp. 192-196
-
-
Peter, S.1
Langendoerfer, P.2
Piotrowski, K.3
-
13
-
-
0021409284
-
Probabilistic encryption
-
Shafi Goldwasser, Silvio Micali, "Probabilistic encryption", Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
15
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
In, Springer-Verlag
-
ElGamal, Taher, "A public key cryptosystem and a signature scheme based on discrete logarithms". In Proceedings of the CRYPTO 84, Advances in cryptology, Springer-Verlag, pp. 10-18, 1984.
-
(1984)
Proceedings of the CRYPTO 84, Advances in cryptology
, pp. 10-18
-
-
Elgamal, T.1
-
16
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM, ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
18
-
-
62749173630
-
Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN)
-
Levent Ertaul, Johan H. Yang, "Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN)", In Proceedings of the International Conference on Security Management, SAM 2008, pp. 498-504, 2008.
-
(2008)
Proceedings of the International Conference on Security Management, SAM 2008
, pp. 498-504
-
-
Ertaul, L.1
Yang, J.H.2
-
19
-
-
0034445661
-
System Architecture Directions for Networked Sensors
-
In, ACM Press
-
th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), ACM Press, pp. 93-104, 2000.
-
(2000)
th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000)
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
20
-
-
0037702249
-
The nesC language: A holistic approach to network embedded systems
-
David Gay, Phil Levis, Rob von Behren, Matt Welsh, Eric Brewer, and David Culler, "The nesC language: A holistic approach to network embedded systems", In Proceedings of the International conference on Programming language design and implementation (PLDI '03), pp. 1-11, 2003.
-
(2003)
Proceedings of the International conference on Programming language design and implementation (PLDI '03)
, pp. 1-11
-
-
Gay, D.1
Levis, P.2
von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
22
-
-
33744909363
-
Avrora: Scalable sensor network simulation with precise timing
-
In, Los Angeles, CA
-
Ben L. Titzer, Daniel Lee, and Jens Palsberg, "Avrora: Scalable sensor network simulation with precise timing", In Proceedings of the 4th Intl. Conf. on Information Processing in Sensor Networks (IPSN), Los Angeles, CA, pp. 477-482, 2005.
-
(2005)
Proceedings of the 4th Intl. Conf. on Information Processing in Sensor Networks (IPSN)
, pp. 477-482
-
-
Titzer, B.L.1
Lee, D.2
Palsberg, J.3
-
23
-
-
79961068297
-
Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks
-
Vivaksha Jariwala, Devesh Jinwala, "Evaluating Galois Counter Mode in Link Layer Security Architecture for Wireless Sensor Networks", International Journal of Network Security and Its Applications, vol 2, no. 4, pp. 55-65, 2010.
-
(2010)
International Journal of Network Security and Its Applications
, vol.2
, Issue.4
, pp. 55-65
-
-
Jariwala, V.1
Jinwala, D.2
|