-
1
-
-
84874468531
-
Data-aggregation techniques in sensor networks: A survey
-
Oct.-Nov
-
R. Rajagopalan and P. Varshney, "Data-Aggregation Techniques in Sensor Networks: A Survey," IEEE Comm. Surveys Tutorials, vol. 8, no. 4, pp. 48-63, Oct.-Nov. 2006.
-
(2006)
IEEE Comm. Surveys Tutorials
, vol.8
, Issue.4
, pp. 48-63
-
-
Rajagopalan, R.1
Varshney, P.2
-
2
-
-
84978428047
-
TAG: A tiny aggregation service for ad-hoc sensor networks
-
S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, "TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks," Proc. Fifth Symp. Operating Systems Design and Implementation, 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation
-
-
Madden, S.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
3
-
-
33747610408
-
Robust computation of aggregates in wireless sensor networks: Distributed randomized algorithms and analysis
-
DOI 10.1109/TPDS.2006.128
-
J.-Y. Chen, G. Pandurangan, and D. Xu, "Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis," IEEE Trans. Parallel Distributed Systems, vol. 17, no. 9, pp. 987-1000, Sept. 2006. (Pubitemid 44263827)
-
(2006)
IEEE Transactions on Parallel and Distributed Systems
, vol.17
, Issue.9
, pp. 987-1000
-
-
Chen, J.-Y.1
Pandurangan, G.2
Xu, D.3
-
4
-
-
32644435647
-
Energy-efficient secure pattern based data aggregation for wireless sensor networks
-
DOI 10.1016/j.comcom.2004.12.029, PII S0140366405000411
-
H. Çam, S. Özdemir, P. Nair, D. Muthuavinashiappan, and H. Ozgur Sanli, "Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks," J. Computer Comm., vol. 29, pp. 446-455, 2006. (Pubitemid 43243228)
-
(2006)
Computer Communications
, vol.29
, Issue.4
, pp. 446-455
-
-
Cam, H.1
Ozdemir, S.2
Nair, P.3
Muthuavinashiappan, D.4
Ozgur Sanli, H.5
-
5
-
-
17144429336
-
SRDA: Secure reference-based data aggregation protocol for wireless sensor networks
-
2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security
-
H. Sanli, S. Ozdemir, and H. Cam, "SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks," Proc. IEEE 60th Int'l Conf. Vehicular Technology (VTC '04-Fall), vol. 7, pp. 4650-4654, Sept. 2004. (Pubitemid 40512754)
-
(2004)
IEEE Vehicular Technology Conference
, vol.60
, Issue.7
, pp. 4650-4654
-
-
Sanli, H.O.1
Ozdemir, S.2
Cam, H.3
-
6
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
DOI 10.1109/TMC.2006.144, 1683790
-
D. Westhoff, J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006. (Pubitemid 44335247)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
7
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
DOI 10.1109/MOBIQUITOUS.2005.25, 1540992, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems, pp. 109-117, July 2005. (Pubitemid 44523269)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
8
-
-
42549159545
-
Public key based cryptoschemes for data concealment in wireless sensor networks
-
DOI 10.1109/ICC.2006.255111, 4024506, 2006 IEEE International Conference on Communications, ICC 2006
-
E. Mykletun, J. Girao, and D. Westhoff, "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm., vol. 5, pp. 2288-2295, June 2006. (Pubitemid 351575572)
-
(2006)
IEEE International Conference on Communications
, vol.5
, pp. 2288-2295
-
-
Mykletun, E.1
Girao, J.2
Westhoff, D.3
-
9
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
DOI 10.1145/1180405.1180440, 1180440, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
H. Chan, A. Perrig, and D. Song, "Secure Hierarchical In-Network Aggregation in Sensor Networks," Proc. ACM 13th Conf. Computer and Comm. Security, pp. 278-287, 2006. (Pubitemid 47131376)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 278-287
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
49449109253
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," ACM Trans. Information and System Security (TISSEC), vol. 11, no. 4, pp. 1-43, 2008.
-
(2008)
ACM Trans. Information and System Security (TISSEC)
, vol.11
, Issue.4
, pp. 1-43
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
11
-
-
34547406263
-
Attack-resilient hierarchical data aggregation in sensor networks
-
DOI 10.1145/1180345.1180355, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
S. Roy, S. Setia, and S. Jajodia, "Attack-Resilient Hierarchical Data Aggregation in Sensor Networks," Proc. ACM Fourth Workshop Security of Ad Hoc and Sensor Networks, pp. 71-82, 2006. (Pubitemid 47168559)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 71-82
-
-
Roy, S.1
Setia, S.2
Jajodia, S.3
-
12
-
-
71049159106
-
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
-
H. Yu, "Secure and Highly-Available Aggregation Queries in Large-Scale Sensor Networks via Set Sampling," Proc. IEEE Int'l Conf. Information Processing in Sensor Networks, pp. 1-12, 2009.
-
(2009)
Proc. IEEE Int'l Conf. Information Processing in Sensor Networks
, pp. 1-12
-
-
Yu, H.1
-
13
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), pp. 416-432, 2003.
-
(2003)
Proc. 22nd Int'l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt)
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
14
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
DOI 10.1109/TWC.2002.804190
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002. (Pubitemid 44934253)
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
15
-
-
33747607030
-
A fault-local self-stabilizing clustering service for wireless ad hoc networks
-
DOI 10.1109/TPDS.2006.113
-
M. Demirbas, A. Arora, V. Mittal, and V. Kulathumani, "A Fault-Local Self-Stabilizing Clustering Service for Wireless Ad Hoc Networks," IEEE Trans. Parallel Distributed Systems, vol. 17, no. 9, pp. 912-922, Sept. 2006. (Pubitemid 44263821)
-
(2006)
IEEE Transactions on Parallel and Distributed Systems
, vol.17
, Issue.9
, pp. 912-922
-
-
Demirbas, M.1
Arora, A.2
Mittal, V.3
Kulathumani, V.4
-
16
-
-
33644913373
-
Localized protocols for ad hoc clustering and backbone formation: A performance comparison
-
DOI 10.1109/TPDS.2006.52
-
S. Basagni, M. Mastrogiovanni, A. Panconesi, and C. Petrioli, "Localized Protocols for Ad Hoc Clustering and Backbone Formation: A Performance Comparison," IEEE Trans. Parallel Distributed Systems, vol. 17, no. 4, pp. 292-306, Apr. 2006. (Pubitemid 43380046)
-
(2006)
IEEE Transactions on Parallel and Distributed Systems
, vol.17
, Issue.4
, pp. 292-306
-
-
Basagni, S.1
Mastrogiovanni, M.2
Panconesi, A.3
Petrioli, C.4
-
17
-
-
84966238549
-
Monte carlo methods for index computation (mod p)
-
J. Pollard, "Monte Carlo Methods for Index Computation (mod p)," Math. of Computation, vol. 32, pp. 918-924, 1978.
-
(1978)
Math. of Computation
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
18
-
-
52249097627
-
Concealed data aggregation in heterogeneous sensor networks using privacy homomorphism
-
July
-
S. Ozdemir, "Concealed Data Aggregation in Heterogeneous Sensor Networks Using Privacy Homomorphism," Proc. IEEE Int'l Conf. Pervasive Services, pp. 165-168, July 2007.
-
(2007)
Proc. IEEE Int'l Conf. Pervasive Services
, pp. 165-168
-
-
Ozdemir, S.1
-
21
-
-
51749097975
-
Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge
-
July
-
T.H. Hai and E.-N. Huh, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-Hops Neighbor Knowledge," Proc. IEEE Seventh Int'l Symp. Network Computing and Applications, pp. 325-331, July 2008.
-
(2008)
Proc. IEEE Seventh Int'l Symp. Network Computing and Applications
, pp. 325-331
-
-
Hai, T.H.1
Huh, E.-N.2
-
22
-
-
84862813364
-
Design and implementation of a zigbee-based communication substrate for wireless sensor networks
-
W. Li, C. Chou, and Z. Lin, "Design and Implementation of a Zigbee-Based Communication Substrate for Wireless Sensor Networks," Proc. Nat'l Computer Symp. Conf., 2006.
-
(2006)
Proc. Nat'l Computer Symp. Conf
-
-
Li, W.1
Chou, C.2
Lin, Z.3
-
23
-
-
78751642743
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
vol. 34
-
L. Oliveira et al., "TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks," Computer Comm., vol. 34, pp. 485-493, vol. 34, 2010.
-
(2010)
Computer Comm.
, vol.34
, pp. 485-493
-
-
Oliveira, L.1
-
24
-
-
33646581008
-
Energy Analysis of public-key cryptography for wireless sensor networks
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," Proc. IEEE Third Int'l Conf. Pervasive Computing and Comm. (PERCOM '06), 2005.
-
(2005)
Proc. IEEE Third Int'l Conf. Pervasive Computing and Comm. (PERCOM '06)
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
25
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. De Meulenaer, F. Gosset, F.X. Standaert, and L. Vandendorpe, "On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm., pp. 580-585, 2008.
-
(2008)
Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm.
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.X.3
Vandendorpe, L.4
|