-
1
-
-
36249025569
-
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
-
Nov.
-
R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. T. Kandemir. On the Detection of Clones in Sensor Networks Using Random Key Predistribution. IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, vol. 37, no. 6, pp. 1246-1258, Nov. 2007.
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
2
-
-
37849004592
-
A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks
-
M. Conti, R. D. Pietro, L. V. Mancini, and A. Mei. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2007.
-
ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2007
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
4
-
-
31744440684
-
Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information
-
DOI 10.1109/TIT.2005.862083
-
E. J. Candès, J. K. Romberg, and T. Tao. Robust Uncertainty Principles: Exact Signal Reconstruction from Highly Incomplete Frequency Information. IEEE Transactions on Infomation Theory, 52(2):489-509, 2006. (Pubitemid 43174093)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.2
, pp. 489-509
-
-
Candes, E.J.1
Romberg, J.2
Tao, T.3
-
6
-
-
79953769032
-
Using the Power of Two Choics to Improve Bloom Filters
-
S. Lumetta and M. Mitzenmacher. Using the Power of Two Choics to Improve Bloom Filters. Internet Mathematics, vol. 4, no. 1, pp. 17-33, 2009.
-
(2009)
Internet Mathematics
, vol.4
, Issue.1
, pp. 17-33
-
-
Lumetta, S.1
Mitzenmacher, M.2
-
9
-
-
51849124994
-
Implementing Public- Key Infrastructure for Sensor Networks
-
D. J. Malan, M. Welsh, and M. D. Smith. Implementing Public- Key Infrastructure for Sensor Networks. ACM Transactions on Sensor Network, vol. 4, no. 4, pp. 1-23, 2008.
-
(2008)
ACM Transactions on Sensor Network
, vol.4
, Issue.4
, pp. 1-23
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
11
-
-
72449171946
-
Double Rulings for Information Brokerage in Sensor Networks
-
R. Sarkar, X. Zhu, and J. Gao. Double Rulings for Information Brokerage in Sensor Networks. IEEE/ACM Transactions on Networking (TON), vol. 17, no. 6, 2009.
-
(2009)
IEEE/ACM Transactions on Networking (TON)
, vol.17
, Issue.6
-
-
Sarkar, R.1
Zhu, X.2
Gao, J.3
-
12
-
-
51849154670
-
Real Time Detection of Clone Attack in Wireless Sensor Networks
-
K. Xing, F. Liu, X. Cheng, and D. Du. Real Time Detection of Clone Attack in Wireless Sensor Networks, In IEEE International Conference on Distributed Computing Systems (ICDCS), 2008.
-
IEEE International Conference on Distributed Computing Systems (ICDCS), 2008
-
-
Xing, K.1
Liu, F.2
Cheng, X.3
Du, D.4
-
13
-
-
77952973912
-
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks
-
B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Transactions on Mobile Computing, vol. 9, no. 7, 2010.
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.7
-
-
Zhu, B.1
Setia, S.2
Jajodia, S.3
Roy, S.4
Wang, L.5
-
14
-
-
79952798742
-
Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks
-
Y. Zeng, J. Cao, S. Zhang, S. Guo, and L. Xie. Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, 2010.
-
(2010)
IEEE Journal on Selected Areas in Communications
, vol.28
, Issue.5
-
-
Zeng, Y.1
Cao, J.2
Zhang, S.3
Guo, S.4
Xie, L.5
|