-
1
-
-
39049088056
-
A secur triple-key management scheme for wireless sensor networks
-
April
-
T.A. Zia and A.Y. Zomaya, "A secur triple-key management scheme for wireless sensor networks," In the proceedings of INFOCOM 2006,25th IEEE International Conference on Computer Communications, Barcelona, pp.1-2, April, 2006.
-
(2006)
The Proceedings of INFOCOM 2006,25th IEEE International Conference on Computer Communications, Barcelona
, pp. 1-2
-
-
Zia, T.A.1
Zomaya, A.Y.2
-
2
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney,"A key management scheme for wireless sensor networks using deployment knowledge," IEEE InfoCom 2004.
-
IEEE InfoCom 2004
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
3
-
-
32844459414
-
A key predistribution scheme for sensor networks using deployment knowledge
-
DOI 10.1109/TDSC.2006.2
-
W. Du, J. Deng, Y.S. Han, P.K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Transactions on Dependable and Secure Computing, Vol. 3, Issue 1, pp.62-77, 2006. (Pubitemid 43254254)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
may Oakland, California USA
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," In Proceedings of the IEEE Symposium on Security and Privacy (S&P'03), pp.197-213, may 2003, Oakland, California USA.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy (S&P'03)
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
-
Du X, Xiao Y, M Guizani and Chen H.H, "Effective key management for sensor networks,an effective key management scheme for heterogeneous sensor networks", Ad Hoc Networks, Volume 5, Issue 1, pp. 24-34, January 2007. (Pubitemid 44573000)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.-H.4
-
8
-
-
80053001439
-
Threat models and security issues in wireless sensor networks
-
Kuala Lumpur, Malaysia
-
Idrees S. Kocher, Chee-Onn Chow, Hiroshi Ishii and Tanveer A Zia, "Threat models and security issues in wireless sensor networks, ''In proceeding of (ICINC 2010),Vol.1, pp. 384-389, Kuala Lumpur, Malaysia.
-
Proceeding of (ICINC 2010)
, vol.1
, pp. 384-389
-
-
Kocher, I.S.1
Chow, C.-O.2
Ishii, H.3
Zia, T.A.4
-
9
-
-
52049119700
-
Securing Wireless Sensor Networks: Security Architectures
-
D. Boyle and Thomas Newe," Securing Wireless Sensor Networks: security Architectures" (2008), Journal of Networks, VOL. 3, NO. 1,pp. 65-77.
-
(2008)
Journal of Networks
, vol.3
, Issue.1
, pp. 65-77
-
-
Boyle, D.1
Newe, T.2
-
10
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D.Tygar, "Spins: Security protocols for sensor networks," Wireless Networks, Vol.8,pp.521 - 534, 2002.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
11
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu S., Setia S. and Jajodia S., "LEAP: EfficientSecurity mechanisms for large-scale distributed sensor networks," CCS '03, Washington D.C., USA, 27-31 October 2003, New York, USA: ACM Press, 62-72. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
12
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
Zhu S., Setia S. and Jajodia S.,"LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks TOSN,Vol.2,No.4,pp. 500-528.
-
ACM Transactions on Sensor Networks TOSN
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
14
-
-
80055103908
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Shastry and D. Wagner," TinySec: A link layer security architecture for wireless sensor networks," SenSys'04, November 3-5, 2004, Maryland, USA.
-
SenSys'04, November 3-5, 2004, Maryland, USA
-
-
Karlof, C.1
Shastry, N.2
Wagner, D.3
-
15
-
-
35348897342
-
MiniSec: A Secure Sensor Network Communication Architecture
-
M. Luk, G. Mezzour, A. Perrig, and V. Gilgor, "MiniSec: A Secure Sensor Network Communication Architecture",PSN'07, April 25-27, 2007, Cambridge, Massachusetts,USA.
-
PSN'07, April 25-27, 2007, Cambridge, Massachusetts,USA
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gilgor, V.4
-
17
-
-
67650657363
-
Censor Networks: A critique of "sensor networks" from a systems perspective
-
July
-
B. Raman and K.Chebrolu, "Censor Networks: A critique of "sensor networks" from a systems perspective', ACM SIGCOMM Computer Communication Review, Vol. 38, No. 3, July 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.3
-
-
Raman, B.1
Chebrolu, K.2
-
18
-
-
84858244293
-
Cross layer resource allocation cheme under heterogeneous constraints for next generation high rate
-
WPAN (2010)
-
A. Khalil, M. Crussière and J. Hélard,"Cross layer resource allocation cheme under heterogeneous constraints for next generation high rate,"WPAN (2010),International Journal of Computer Networks and Communications (IJCNC) vol 2, No.3.
-
International Journal of Computer Networks and Communications (IJCNC)
, vol.2
, Issue.3
-
-
Khalil, A.1
Crussière, M.2
Hélard, J.3
-
20
-
-
80052385335
-
Complete security framework for wireless sensor networks
-
K. Sharma, M.K. Ghose and Kuldeep,"Complete security framework for wireless sensor networks. IJCSIS, Vol.3,No.1,2009.
-
(2009)
IJCSIS
, vol.3
, Issue.1
-
-
Sharma, K.1
Ghose, M.K.2
Kuldeep3
-
21
-
-
80052999781
-
Cross layer security framework for wireless sensor networks
-
K. Sharma and G. MK,"Cross layer security framework for wireless sensor networks," IJSA,Vol. 5,No.1,pp.39-52.,2011.
-
(2011)
IJSA
, vol.5
, Issue.1
, pp. 39-52
-
-
Sharma, K.1
MK, G.2
-
22
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks", ACM CCS,2003.
-
(2003)
ACM CCS
-
-
Liu, D.1
Ning, P.2
-
23
-
-
79957982045
-
-
Version 3.2,User's Manual, NICTA,Australia, March
-
Athanassios Boulis, "Castalia: A simulator for Wireless Sensor Networks and Body Area Networks,"Version 3.2,User's Manual, NICTA,Australia, March 2011.
-
(2011)
Castalia: A Simulator for Wireless Sensor Networks and Body Area Networks
-
-
Boulis, A.1
|