-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
33846932583
-
Vital signs monitoring and patient tracking over a wireless network
-
Sept
-
T. Gao, D. Greenspan, M. Welesh, R.R. Juang, and A. Alm, "Vital Signs Monitoring and Patient Tracking over a Wireless Network," Proc. IEEE 27th Ann. Int'l Conf. Eng. Medicine and Biology Soc. (EMBS), Sept. 2005.
-
(2005)
Proc IEEE 27th Ann. Int'l Conf. Eng. Medicine and Biology Soc. (EMBS)
-
-
Gao, T.1
Greenspan, D.2
Welesh, M.3
Juang, R.R.4
Alm, A.5
-
6
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
DOI 10.1109/MCOM.2002.1039859
-
H. Deng, W. Li, and D.P. Agrawal, "Routing Security in Wireless Ad Hoc Networks," Proc. IEEE Comm. Magazine, pp. 70-75, 2002. (Pubitemid 35311948)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
7
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm for sensor networks
-
C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks," Proc. MobiCom, pp. 56-67, 2000. (Pubitemid 32024682)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
8
-
-
4544231245
-
Intelligent fluid infrastructure for embedded networks
-
June
-
A. Kansal, A. Somasundara, D. Jea, M. Srivastava, and D. Estrin, "Intelligent Fluid Infrastructure for Embedded Networks," Proc. Second ACM Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '04), June 2004.
-
(2004)
Proc. Second ACM Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '04)
-
-
Kansal, A.1
Somasundara, A.2
Jea, D.3
Srivastava, M.4
Estrin, D.5
-
9
-
-
17444417505
-
Efficient collection of sensor data in remote fields using mobile collectors
-
Oct
-
Y. Tirta, Z. Li, Y. Lu, and S. Bagchi, "Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors," Proc. 13th Int'l Conf. Computer Comm. and Networks (ICCCN '04), Oct. 2004.
-
(2004)
Proc. 13th Int'l Conf. Computer Comm. and Networks (ICCCN '04)
-
-
Tirta, Y.1
Li, Z.2
Lu, Y.3
Bagchi, S.4
-
11
-
-
84943517831
-
Data dissemination with ring-based index for wireless sensor networks
-
Nov
-
W. Zhang, G. Cao, and T. La Porta, "Data Dissemination with Ring-Based Index for Wireless Sensor Networks," Proc. IEEE Int'l Conf. Network Protocols (ICNP), pp. 305-314, Nov. 2003.
-
(2003)
Proc IEEE Int'l Conf. Network Protocols (ICNP)
, pp. 305-314
-
-
Zhang, W.1
Cao, G.2
La Porta, T.3
-
14
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
D. Liu, P. Ning, and R.Li. Establishing, "Pairwise Keys in Distributed Sensor Networks," Proc. 10th ACM Conf. Computers and Comm. Security (CCS '03), pp. 52-61, Oct. 2003. (Pubitemid 40673788)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
15
-
-
27644517087
-
Key distribution techniques for sensor networks
-
Kluwer Academic
-
H. Chan, A. Perrig, and D. Song, "Key Distribution Techniques for Sensor Networks," Wireless Sensor Networks, pp. 277-303, Kluwer Academic, 2004.
-
(2004)
Wireless Sensor Networks
, pp. 277-303
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
17
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," Proc. 10th ACM Conf. Computers and Comm. Security (CCS '03), pp. 62-72, Oct. 2003. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
18
-
-
62849114245
-
An efficient key distribution scheme for establishing pairwise keys with a mobile sink in distributed sensor networks
-
Dec
-
A. Rasheed and R. Mahapatra, "An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks," Proc. IEEE 27th Int'l Performance Computing and Comm. Conf. (IPCCC '08), pp. 264-270, Dec. 2008.
-
(2008)
Proc IEEE 27th Int'l Performance Computing and Comm. Conf. (IPCCC '08)
, pp. 264-270
-
-
Rasheed, A.1
Mahapatra, R.2
-
20
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol, 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Comm ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
21
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences," Proc. 12th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '92), pp. 471-486, 1993.
-
(1993)
Proc. 12th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '92)
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
22
-
-
0003195066
-
The md5 message-digest algorithm
-
Apr
-
R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1321, Apr. 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
|