-
1
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Proceedings of Crypto 1987
-
R. Merkle, "A digital signature based on a conventional encryption function." in Proceedings of Crypto 1987, LNCS 293, 1987, pp. 369-378.
-
(1987)
LNCS
, vol.293
, pp. 369-378
-
-
Merkle, R.1
-
2
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: Security protocols for sensor networks." in ACM MobiCom 2001, July 2001, pp. 189-199. (Pubitemid 33006715)
-
(2001)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
3
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel surfing and spatial retreats: defenses against wireless denial of service." in International Conference on Web Information Systems Engineering (WiSe), 2004, pp. 80-89. (Pubitemid 40062798)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
4
-
-
54949148390
-
Prospects and problems of wireless communication for underwater sensor networks
-
L. Liu, S. Zhou, and J.-H. Cui, "Prospects and problems of wireless communication for underwater sensor networks." in Wiley Wireless Communications and Mobile Computing, Special Issue on Underwater Sensor Networks, 2008, vol. 8, no. 8, pp. 977-994.
-
(2008)
Wiley Wireless Communications and Mobile Computing, Special Issue on Underwater Sensor Networks
, vol.8
, Issue.8
, pp. 977-994
-
-
Liu, L.1
Zhou, S.2
Cui, J.-H.3
-
5
-
-
33745111889
-
The challenges of building scalable mobile underwater wireless sensor networks for aquatic applications
-
DOI 10.1109/MNET.2006.1637927
-
J.-H. Cui, J. Kong, M. Gerla, and S. Zhou, "Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications." IEEE Network, Special Issue on Wireless Sensor Networking, vol. 20, no. 3, pp. 12-18, 2006. (Pubitemid 43885282)
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 12-18
-
-
Cui, J.-H.1
Kong, J.2
Gerla, M.3
Zhou, S.4
-
7
-
-
80052933381
-
Aqua-TUNE: A field testbed for underwater networks
-
June
-
Z. Peng, S. Le, M. Zuba, H. Mo, Y. Zhu, L. Pu, J. Liu, and J.-H. Cui, "Aqua-TUNE: A field testbed for underwater networks." in Proc. of OCEANS'11 IEEE Santander, June 2011.
-
(2011)
Proc. of OCEANS'11 IEEE Santander
-
-
Peng, Z.1
Le, S.2
Zuba, M.3
Mo, H.4
Zhu, Y.5
Pu, L.6
Liu, J.7
Cui, J.-H.8
-
9
-
-
84855678169
-
Dsp based receiver implementation for ofdm acoustic modems
-
H. Yan, L. Wan, S. Zhou, J. Cui, J. Huang, and H. Zhou, "Dsp based receiver implementation for ofdm acoustic modems." in Elsevier Journal on Physical Communication, 2011.
-
(2011)
Elsevier Journal on Physical Communication
-
-
Yan, H.1
Wan, L.2
Zhou, S.3
Cui, J.4
Huang, J.5
Zhou, H.6
-
10
-
-
33144488116
-
Low-cost attacks against packet delivery, localization and synchronization services in under-water sensor networks
-
J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhargava, "Low-cost attacks against packet delivery, localization and synchronization services in under-water sensor networks." in ACM WiSe, 2005.
-
(2005)
ACM WiSe
-
-
Kong, J.1
Ji, Z.2
Wang, W.3
Gerla, M.4
Bagrodia, R.5
Bhargava, B.6
-
11
-
-
84899740998
-
Visualisation of wormholes in underwater sensor networks: A distributed approach
-
DOI 10.1504/IJSN.2008.016198
-
W. Wang, J. Kong, B. Bhargava, and M. Gerla, "Visualization of wormholes in underwater sensor networks: a distributed approach." in International Journal of Security and Networks, 2008, pp. vol. 3, No. 1, pp. 10-23. (Pubitemid 351546018)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 10-23
-
-
Wang, W.1
Kong, J.2
Bhargava, B.3
Gerla, M.4
-
12
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks." in ACM MobiHoc, 2005, pp. 46-57. (Pubitemid 43037582)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
13
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks." in IEEE INFOCOM, 2007, pp. 1307-1315. (Pubitemid 47334355)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
14
-
-
56049093216
-
Multicarrier communication over underwater acoustic channels with nonuniform Doppler shifts
-
April
-
B. Li, S. Zhou, M. Stojanovic, L. Freitag, and P. Willett, "Multicarrier communication over underwater acoustic channels with nonuniform Doppler shifts." in IEEE Journal of Oceanic Engineering, April 2008, vol 33, no.2, pp. 198-209.
-
(2008)
IEEE Journal of Oceanic Engineering
, vol.33
, Issue.2
, pp. 198-209
-
-
Li, B.1
Zhou, S.2
Stojanovic, M.3
Freitag, L.4
Willett, P.5
|