-
2
-
-
33845808851
-
SIA: Secure Information Aggregation in sensor networks
-
H. Chan, A. Perrig, B. Przydatek, and D. Song. SIA: Secure Information Aggregation in Sensor Networks. Journal of Computer Security, 15(1), 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
-
-
Chan, H.1
Perrig, A.2
Przydatek, B.3
Song, D.4
-
3
-
-
33845747795
-
Secure hierarchical innetwork aggregation for sensor networks
-
H. Chan, A. Perrig, and D. Song. Secure Hierarchical Innetwork Aggregation for Sensor Networks. In CCS, 2006.
-
(2006)
CCS
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
0842332407
-
A witnessbased approach for data fusion assurance in wireless sensor networks
-
W. Du, J. Deng, Y. Han, and P. K. Varshney. A Witnessbased Approach for Data Fusion Assurance in Wireless Sensor Networks. In GLOBECOM, 2003.
-
(2003)
GLOBECOM
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.K.4
-
7
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. Gligor. A Key-Management Scheme for Distributed Sensor Networks. In CCS, 2002.
-
(2002)
CCS
-
-
Eschenauer, L.1
Gligor, V.2
-
9
-
-
56749178915
-
An efficient integritypreserving scheme for hierarchical sensor aggregation
-
K. Frikken and J. Dougherty. An Efficient Integritypreserving Scheme for Hierarchical Sensor Aggregation. In WiSec, 2008.
-
(2008)
WiSec
-
-
Frikken, K.1
Dougherty, J.2
-
11
-
-
47249135553
-
Efficient and robust secure aggregation for sensor networks
-
P. Haghani, P. Papadimitratos, M. Poturalski, K. Aberer, and J. Hubaux. Efficient and robust secure aggregation for sensor networks. In NPSec, 2007.
-
(2007)
NPSec
-
-
Haghani, P.1
Papadimitratos, P.2
Poturalski, M.3
Aberer, K.4
Hubaux, J.5
-
12
-
-
84943753034
-
Secure aggregation for wireless networks
-
L. Hu and D. Evans. Secure Aggregation for Wireless Networks. In WSAAN, 2003.
-
(2003)
WSAAN
-
-
Hu, L.1
Evans, D.2
-
13
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. Johnson. Wormhole attacks in wireless networks. Journal on Selected Areas in Communications, 24(2):370-380, 2006.
-
(2006)
Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
14
-
-
33845723696
-
Efficient secure aggregation in sensor networks
-
P. Jadia and A. Mathuria. Efficient Secure Aggregation in Sensor Networks. In HiPC, 2004.
-
(2004)
HiPC
-
-
Jadia, P.1
Mathuria, A.2
-
16
-
-
18144428307
-
SecureDAV: A secure data aggregation and verification protocol for sensor networks
-
A. Mahimkar and T. Rappaport. SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks. In GLOBECOM, 2004.
-
(2004)
GLOBECOM
-
-
Mahimkar, A.1
Rappaport, T.2
-
17
-
-
33748699331
-
Computing separable functions via gossip
-
D. Mosk-Aoyama and D. Shah. Computing Separable Functions via Gossip. In PODC, 2006.
-
(2006)
PODC
-
-
Mosk-Aoyama, D.1
Shah, D.2
-
18
-
-
27644449262
-
Synopsis diffusion for robust aggregation in sensor networks
-
S. Nath, P. B. Gibbons, S. Seshan, and Z. Anderson. Synopsis Diffusion for Robust Aggregation in Sensor Networks. In SenSys, 2004.
-
(2004)
SenSys
-
-
Nath, S.1
Gibbons, P.B.2
Seshan, S.3
Anderson, Z.4
-
19
-
-
71049160902
-
Secure Outsourced Aggregation via One-way Chains
-
S. Nath, H. Yu, and H. Chan. Secure Outsourced Aggregation via One-way Chains. In ACM SIGMOD, 2009.
-
(2009)
ACM SIGMOD
-
-
Nath, S.1
Yu, H.2
Chan, H.3
-
20
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
P. Ning, A. Liu, and W. Du. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks. ACM Transactions on Sensor Networks, 2008.
-
(2008)
ACM Transactions on Sensor Networks
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
22
-
-
77953852618
-
Secure sensor network routing: A clean-slate approach
-
B. Parno, M. Luk, E. Gaustad, and A. Perrig. Secure Sensor Network Routing: A Clean-Slate Approach. In CoNEXT, 2006.
-
(2006)
CoNEXT
-
-
Parno, B.1
Luk, M.2
Gaustad, E.3
Perrig, A.4
-
23
-
-
34547406263
-
Attack-resilient hierarchical data aggregation in sensor networks
-
S. Roy, S. Setia, and S. Jajodia. Attack-resilient Hierarchical Data Aggregation in Sensor Networks. In SASN, 2006.
-
(2006)
SASN
-
-
Roy, S.1
Setia, S.2
Jajodia, S.3
-
24
-
-
70849094465
-
Efficient handling of adversary attacks in aggregation applications
-
G. Taban and V. Gligor. Efficient handling of adversary attacks in aggregation applications. In ESORICS, 2008.
-
(2008)
ESORICS
-
-
Taban, G.1
Gligor, V.2
-
25
-
-
37849012001
-
Containing denial-of-service attacks in broadcast authentication in sensor networks
-
R.Wang, W. Du, and P. Ning. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks. In MobiHoc, 2007.
-
(2007)
MobiHoc
-
-
Wang, R.1
Du, W.2
Ning, P.3
-
26
-
-
34547477757
-
SIGF: A family of configurable, secure routing protocols for wireless sensor networks
-
A. Wood, L. Fang, J. Stankovic, and T. He. SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks. In SASN, 2006.
-
(2006)
SASN
-
-
Wood, A.1
Fang, L.2
Stankovic, J.3
He, T.4
-
27
-
-
33748089962
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Y. Yang, X. Wang, S. Zhu, and G. Cao. SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. In MobiHoc, 2006.
-
(2006)
MobiHoc
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
28
-
-
36848999303
-
Brief announcement: DoS-resilient secure aggregation queries in sensor networks
-
H. Yu. Brief Announcement: DoS-Resilient Secure Aggregation Queries in Sensor Networks. In PODC, 2007.
-
(2007)
PODC
-
-
Yu, H.1
-
29
-
-
71049159106
-
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
-
H. Yu. Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. In IPSN, 2009.
-
(2009)
IPSN
-
-
Yu, H.1
|