-
1
-
-
76549106506
-
Vulnerabilities and attacks in wireless sensor networks
-
Benenson, Z., Cholewinski, P., and Freiling, F. (2008). Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, pages 22-43.
-
(2008)
Wireless Sensors Networks Security
, pp. 22-43
-
-
Benenson, Z.1
Cholewinski, P.2
Freiling, F.3
-
2
-
-
84963650728
-
Universal Classes of Hash Functions (Extended Abstract)
-
ACM
-
Carter, J. L. and Wegman, M. N. (1977). Universal Classes of Hash Functions (Extended Abstract). In Proc. of STOC'07, pages 106-112. ACM.
-
(1977)
Proc. of STOC'07
, pp. 106-112
-
-
Carter, J.L.1
Wegman, M.N.2
-
3
-
-
78449273182
-
Accurate modeling and prediction of energy availability in energy harvesting real-time embedded systems
-
Lu, J., Liu, S., Wu, Q., and Qiu, Q. (2010). Accurate modeling and prediction of energy availability in energy harvesting real-time embedded systems. In Proc. of IGCC'10, pages 469-476.
-
(2010)
Proc. of IGCC'10
, pp. 469-476
-
-
Lu, J.1
Liu, S.2
Wu, Q.3
Qiu, Q.4
-
4
-
-
78149394262
-
Main types of attacks in wireless sensor networks
-
WSEAS
-
Lupu, T.-G. (2009). Main types of attacks in wireless sensor networks. In Proc. of the 9th WSEAS SSIP'09/MIV'09, pages 180-185. WSEAS.
-
(2009)
Proc. of the 9th WSEAS SSIP'09/MIV'09
, pp. 180-185
-
-
Lupu, T.-G.1
-
5
-
-
78650500280
-
Wireless sensor network attacks and security mechanisms: A short survey
-
Martins, D. and Guyennet, H. (2010). Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey. In Proc. of NBiS'10, pages 313-320.
-
(2010)
Proc. of NBiS'10
, pp. 313-320
-
-
Martins, D.1
Guyennet, H.2
-
6
-
-
79957896372
-
Providing security in energy harvesting sensor networks
-
Pelissier, S., Prabhakar, T., Jamadagni, H., VenkateshaPrasad, R., and Niemegeers, I. (2011). Providing Security in Energy Harvesting Sensor Networks. In Proc. of CCNC'11 IEEE, pages 452-456.
-
(2011)
Proc. of CCNC'11 IEEE
, pp. 452-456
-
-
Pelissier, S.1
Prabhakar, T.2
Jamadagni, H.3
VenkateshaPrasad, R.4
Niemegeers, I.5
-
7
-
-
84862135412
-
A survey on wireless sensor network security
-
abs/1011.1529
-
Sen, J. (2010). A survey on wireless sensor network security. CoRR, abs/1011.1529.
-
(2010)
CoRR
-
-
Sen, J.1
-
8
-
-
79959289243
-
Energy harvesting sensor nodes: Survey and implications
-
IEEE
-
Sudevalayam, S. and Kulkarni, P. (2011). Energy harvesting sensor nodes: Survey and implications. Communications Surveys Tutorials, IEEE, 13(3):443-461.
-
(2011)
Communications Surveys Tutorials
, vol.13
, Issue.3
, pp. 443-461
-
-
Sudevalayam, S.1
Kulkarni, P.2
-
9
-
-
78651454154
-
QoS and security in energy-harvesting wireless sensor networks
-
Taddeo, A. V., Mura, M., and Ferrante, A. (2010). QoS and Security in Energy-Harvesting Wireless Sensor Networks. In Proc. of SECRYPT'10, pages 1-10.
-
(2010)
Proc. of SECRYPT'10
, pp. 1-10
-
-
Taddeo, A.V.1
Mura, M.2
Ferrante, A.3
-
10
-
-
33646581008
-
Energy analysis of public-key cryptography forwireless sensor networks
-
Wander, A., Gura, N., Eberle, H., Gupta, V., and Shantz, S. (2005). Energy Analysis of Public-Key Cryptography forWireless Sensor Networks. In Proc. of PerCom'05, pages 324-328.
-
(2005)
Proc. of PerCom'05
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
11
-
-
84862135413
-
-
editor, Seoul, Korea, December 8-9, 2000, Proc., Volume 2015 of Lecture Notes in Computer Science, Springer
-
Won, D., editor (2001). Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proc., volume 2015 of Lecture Notes in Computer Science. Springer.
-
(2001)
Information Security and Cryptology - ICISC 2000, Third International Conference
-
-
Won, D.1
|