-
1
-
-
84855732027
-
-
Mica2 Specifications, https://www.eol.ucar.edu/rtf/facilities/isa/ internal/CrossBow/DataSheets/mica2.pdf, 2011.
-
(2011)
Mica2 Specifications
-
-
-
2
-
-
84855749200
-
IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals
-
Mar.
-
N. Kushalnagar et al., "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals," IETF RFC 4919, http://tools.ietf.org/html/rfc4919, Mar. 2011.
-
(2011)
IETF RFC 4919
-
-
Kushalnagar, N.1
-
4
-
-
33751044073
-
Talking to strangers: Authentication in Ad-Hoc wireless networks
-
D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," Proc. Symp. Network and Distributed Systems Security, 2002.
-
(2002)
Proc. Symp. Network and Distributed Systems Security
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
6
-
-
0003035229
-
A note on an error detection code for asymmetric channels
-
J.M. Berger, "A Note on an Error Detection Code for Asymmetric Channels," Information and Control, vol. 4, pp. 68-73, 1961.
-
(1961)
Information and Control
, vol.4
, pp. 68-73
-
-
Berger, J.M.1
-
8
-
-
31344438973
-
Key agreement in peer-to-peer wireless networks
-
DOI 10.1109/JPROC.2005.862475
-
M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key Agreement in Peerto-Peer Wireless Networks," Proc. IEEE, Special Issue on Cryptography and Security, vol. 94, no. 2, pp. 467-478, Feb. 2006. (Pubitemid 43145998)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
9
-
-
77953853641
-
Shake Them Up!: A movement-based pairing protocol for CPU-constrained devices
-
C. Castelluccia and P. Mutaf, "Shake Them Up!: A Movement-Based Pairing Protocol for CPU-Constrained Devices," Proc. ACM MobiSys, 2005.
-
(2005)
Proc. ACM MobiSys
-
-
Castelluccia, C.1
Mutaf, P.2
-
11
-
-
78650421160
-
GAnGS: Gather, authenticate 'n group securely
-
C.-H. Owen Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J.M. McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu, "GAnGS: Gather, Authenticate 'n Group Securely," Proc. ACM MobiCom, 2008.
-
(2008)
Proc. ACM MobiCom
-
-
Owen Chen, C.-H.1
Chen, C.-W.2
Kuo, C.3
Lai, Y.-H.4
McCune, J.M.5
Studer, A.6
Perrig, A.7
Yang, B.-Y.8
Wu, T.-C.9
-
12
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y.S. Han, and P.K. Varshney, "A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks," Proc. ACM Conf. Computer and Comm. Security (CCS '03), 2003.
-
(2003)
Proc. ACM Conf. Computer and Comm. Security (CCS '03)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
14
-
-
84555206829
-
Smart-Its Friends: A technique for users to easily establish connections between smart artefacts
-
L.E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," Proc. Third Int'l Conf. Ubiquitous Computing, 2001.
-
(2001)
Proc. Third Int'l Conf. Ubiquitous Computing
-
-
Holmquist, L.E.1
Mattern, F.2
Schiele, B.3
Alahuhta, P.4
Beigl, M.5
Gellersen, H.W.6
-
16
-
-
70349332824
-
Caveat emptor: A comparative study of secure device pairing methods
-
A. Kumar, N. Saxena, G. Tsudik, and E. Uzun, "Caveat Emptor: A Comparative Study of Secure Device Pairing Methods," Proc. Int'l Conf. Pervasive Computing and Comm. (PerCom '09), 2009.
-
(2009)
Proc. Int'l Conf. Pervasive Computing and Comm. (PerCom '09)
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
17
-
-
79959884874
-
Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
-
C. Kuo, M. Luk, R. Negi, and A. Perrig, "Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes," Proc. Fifth Int'l Conf. Embedded Networked Sensor Systems (SenSys '07), 2007.
-
(2007)
Proc. Fifth Int'l Conf. Embedded Networked Sensor Systems (SenSys '07)
-
-
Kuo, C.1
Luk, M.2
Negi, R.3
Perrig, A.4
-
20
-
-
84555205006
-
KALwEN: A new practical and interoperable key management scheme for body sensor networks
-
Y.W. Law, G. Moniava, Z. Gong, P.H. Hartel, and M. Palaniswami, "KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks," Technical Report TR-CTIT-08-67, 2008.
-
(2008)
Technical Report TR-CTIT-08-67
-
-
Law, Y.W.1
Moniava, G.2
Gong, Z.3
Hartel, P.H.4
Palaniswami, M.5
-
22
-
-
77953304550
-
Group device pairing based secure sensor association and key management for body area networks
-
M. Li, S. Yu, W. Lou, and K. Ren, "Group Device Pairing Based Secure Sensor Association and Key Management for Body Area Networks," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Li, M.1
Yu, S.2
Lou, W.3
Ren, K.4
-
23
-
-
70450239642
-
SPATE: Small-Group PKI-Less authenticated trust establishment
-
Y.-H. Lin, A. Studer, H.-C. Hsiao, J.M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang, "SPATE: Small-Group PKI-Less Authenticated Trust Establishment," Proc. ACM MobiSys, 2009.
-
(2009)
Proc. ACM MobiSys
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.M.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
28
-
-
79951833159
-
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
-
L.H. Nguyen and A.W. Roscoe, "Authentication Protocols Based on Low-Bandwidth Unspoofable Channels: A Comparative Survey," J. Computer Security, vol. 19, pp. 139-201, 2011.
-
(2011)
J. Computer Security
, vol.19
, pp. 139-201
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
29
-
-
78650034784
-
Groupthink: Usability of secure group association for wireless devices
-
R. Nithyanand, N. Saxena, G. Tsudik, and E. Uzun, "Groupthink: Usability of Secure Group Association for Wireless Devices," Proc. 12th ACM Int'l Conf. Ubiquitous Computing, 2010.
-
(2010)
Proc. 12th ACM Int'l Conf. Ubiquitous Computing
-
-
Nithyanand, R.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
30
-
-
84555209452
-
Multichannel protocols for user-friendly and scalable initialization of sensor networks
-
T. Perkovic, I. Stancic, L. Malisa, and M. Cagalj, "Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks," Proc. Fifth Int'l Conf. Security and Privacy in Comm. Networks (Securecomm '09), 2009.
-
(2009)
Proc. Fifth Int'l Conf. Security and Privacy in Comm. Networks (Securecomm '09)
-
-
Perkovic, T.1
Stancic, I.2
Malisa, L.3
Cagalj, M.4
-
31
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
34
-
-
84855742142
-
On the transmission-computation-energy tradeoff in wireless and fixed networks
-
P. Rost and G. Fettweis, "On the Transmission-Computation-Energy Tradeoff in Wireless and Fixed Networks," Computing Research Repository, http://arxiv.org/abs/1008.4565v1, 2010.
-
(2010)
Computing Research Repository
-
-
Rost, P.1
Fettweis, G.2
-
40
-
-
33744908245
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay, "Secure Communications over Insecure Channels Based on Short Authenticated Strings," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05), 2005.
-
(2005)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05)
-
-
Vaudenay, S.1
-
41
-
-
35348851489
-
Multichannel security protocols
-
DOI 10.1109/MPRV.2007.76
-
F.L. Wong and F. Stajano, "Multichannel Security Protocols," IEEE Pervasive Computing, Special Issue on Security and Privacy, vol. 6, no. 4, pp. 31-39, Oct.-Dec. 2007. (Pubitemid 47594392)
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 31-39
-
-
Wong, F.L.1
Stajano, F.2
|