-
2
-
-
20344393082
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
J. W. Hui and D. Culler, "The dynamic behavior of a data dissemination protocol for network programming at scale," in Proc. SenSys'04.
-
Proc. SenSys'04
-
-
Hui, J.W.1
Culler, D.2
-
3
-
-
34249694792
-
Sprinkler: A reliable and energy efficient data dissemination service for extreme scale wireless networks of embedded devices
-
V. Naik, A. Arora, P. Sinha, and H. Zhang, "Sprinkler: a reliable and energy efficient data dissemination service for extreme scale wireless networks of embedded devices," IEEE Trans. Mobile Comput., vol. 6, no. 7, pp. 762-776, 2007.
-
(2007)
IEEE Trans. Mobile Comput.
, vol.6
, Issue.7
, pp. 762-776
-
-
Naik, V.1
Arora, A.2
Sinha, P.3
Zhang, H.4
-
6
-
-
34247397108
-
Secure code distribution in dynamically programmable wireless sensor networks
-
J. Deng, R. Han, and S. Mishra, "Secure code distribution in dynamically programmable wireless sensor networks," in Proc. IPSN'06.
-
Proc. IPSN'06
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
9
-
-
78249233570
-
Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks
-
Y. Law et al., "Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks," EURASIP J. Wireless Commun. and Networking, vol. 2011, pp. 1-21, 2010.
-
(2010)
EURASIP J. Wireless Commun. and Networking
, vol.2011
, pp. 1-21
-
-
Law, Y.1
-
10
-
-
85184647902
-
A protocol for secure and energy-aware reprogramming in WSN
-
C. Parra et al., "A protocol for secure and energy-aware reprogramming in WSN," in Proc. IWCMC'09.
-
Proc. IWCMC'09
-
-
Parra, C.1
-
11
-
-
84861426145
-
An integrated system for secure code distribution in wireless sensor networks
-
N. Bui et al., "An integrated system for secure code distribution in wireless sensor networks," in Proc. Percom'10.
-
Proc. Percom'10
-
-
Bui, N.1
-
12
-
-
51249093755
-
Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks
-
S. Hyun, P. Ning, A. Liu, and W. Du, "Seluge: secure and DoS-resistant code dissemination in wireless sensor networks," in Proc. IPSN'08.
-
Proc. IPSN'08
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
13
-
-
84861428080
-
-
Geoss, http://www.epa.gov/geoss/.
-
Geoss
-
-
-
14
-
-
84861429971
-
-
NOPP, http://www.nopp.org/.
-
NOPP
-
-
-
15
-
-
0035452277
-
Distributed services for information dissemination in selforganizing sensor networks
-
A. Lim, "Distributed services for information dissemination in selforganizing sensor networks," J. Franklin Institute, vol. 38, no. 6, pp. 707-727, 2001.
-
(2001)
J. Franklin Institute
, vol.38
, Issue.6
, pp. 707-727
-
-
Lim, A.1
-
16
-
-
84861445209
-
SDRP: A secure and efficient reprogramming protocol for wireless sensor networks
-
accepted, DOI: 10.1109/TIE.2011.2178214
-
D. He, C. Chen, S. Chan, and J. Bu, "SDRP: a secure and efficient reprogramming protocol for wireless sensor networks," IEE Trans. Ind. Electron., accepted, 2011, DOI: 10.1109/TIE.2011.2178214.
-
(2011)
IEE Trans. Ind. Electron.
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
17
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
D. He, J. Bu, S. Chan, C. Chen, and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 431-436, 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
18
-
-
62949194452
-
A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
-
X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1223-1229, 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1223-1229
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
19
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Trans. Inf. and Syst. Security, vol. 8, no. 1, pp. 41-77, 2005.
-
(2005)
ACM Trans. Inf. and Syst. Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
20
-
-
79957932477
-
Secure time synchronization for wireless sensor networks based on bilinear pairing functions
-
M. Rahman and K. EI-Khatib, "Secure time synchronization for wireless sensor networks based on bilinear pairing functions," IEEE Trans. Parallel Distrib. Systems, accepted, 2010.
-
IEEE Trans. Parallel Distrib. Systems, accepted
, vol.2010
-
-
Rahman, M.1
Ei-Khatib, K.2
-
21
-
-
77954523591
-
T-Check: Bug finding for sensor networks
-
P. Li and J. Regehr, "T-Check: bug finding for sensor networks," in Proc. IPSN'10.
-
Proc. IPSN'10
-
-
Li, P.1
Regehr, J.2
-
22
-
-
67649354423
-
Design and verification of enhanced secure localization scheme in wireless sensor networks
-
D. He, L. Cui, H. Huang, and M. Ma, "Design and verification of enhanced secure localization scheme in wireless sensor networks," IEEE Trans. Parallel Distrib. Systems, vol. 20, no. 7, pp. 1050-1058, 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Systems
, vol.20
, Issue.7
, pp. 1050-1058
-
-
He, D.1
Cui, L.2
Huang, H.3
Ma, M.4
-
23
-
-
0002882557
-
Efficient group signature schemes for large groups
-
of LNCS, Springer Verlag
-
J. Camenisch and M. Stadler, "Efficient group signature schemes for large groups," Advances in Cryptology -CRYPTO '97, vol. 1296 of LNCS, pp. 410-424. Springer Verlag, 1997.
-
(1997)
Advances in Cryptology -CRYPTO '97
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
24
-
-
84966504504
-
Efficient ID-based blind signature and proxy signature from bilinear pairings
-
F. Zhang and K. Kim, "Efficient ID-based blind signature and proxy signature from bilinear pairings," in Proc. ACISP'03.
-
Proc. ACISP'03
-
-
Zhang, F.1
Kim, K.2
-
25
-
-
0037435795
-
Proxy signature schemes based on factoring
-
Z. Shao, "Proxy signature schemes based on factoring," Inf. Process. Lett., vol. 85, no. 3, pp. 137-143, 2003.
-
(2003)
Inf. Process. Lett.
, vol.85
, Issue.3
, pp. 137-143
-
-
Shao, Z.1
-
26
-
-
0009554659
-
Protocols for public key cryptosystems
-
R. Merkle, "Protocols for public key cryptosystems," in Proc. 1980 IEEE S&P.
-
Proc. 1980 IEEE S&P
-
-
Merkle, R.1
-
27
-
-
0002459783
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard, "Client puzzles: a cryptographic countermeasure against connection depletion attacks," in Proc. NDSS'99.
-
Proc. NDSS'99
-
-
Juels, A.1
Brainard, J.2
-
29
-
-
84861433900
-
-
OpenSSL, http://www.openssl.org.
-
OpenSSL
-
-
-
30
-
-
85076915199
-
Quanto: Tracking energy in networked embedded systems
-
R. Fonseca, P. Dutta, P. Levis, and I. Stoica, "Quanto: tracking energy in networked embedded systems," in Proc. USENIX OSDI'08, pp. 323-328.
-
Proc. USENIX OSDI'08
, pp. 323-328
-
-
Fonseca, R.1
Dutta, P.2
Levis, P.3
Stoica, I.4
|