-
4
-
-
14844324732
-
A Robust Reputation System for Peerto-Peer and Mobile Ad-hoc Networks
-
Harvard University, Cambridge MA, U.S.A. June
-
S. Buchegger and J.-Y. Le Boudec. "A Robust Reputation System for Peerto-Peer and Mobile Ad-hoc Networks". Proceedings of P2PEcon 2004, Harvard University, Cambridge MA, U.S.A., June 2004.
-
(2004)
Proceedings of P2PEcon 2004
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
6
-
-
36949013183
-
RBTS: "Distributed Reputationbased Beacon Trust System
-
Indianapolis, USA
-
A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: "Distributed Reputationbased Beacon Trust System". In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA, 2006.
-
(2006)
2nd IEEE International Symposium On Dependable, Autonomic and Secure Computing (DASC'06
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
7
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar. "SPINS: Security Protocols for Sensor Networks". Wireless Networks Journal, September 2002.
-
(2002)
Wireless Networks Journal
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
8
-
-
3543100577
-
Statistical Enroute Detection and Filtering of Injected False Data in Sensor Networks
-
F. Ye, H. Luo, S. Lu, L. Zhang. "Statistical Enroute Detection and Filtering of Injected False Data in Sensor Networks". In Proceedings of IEEE Infocom, 2004.
-
(2004)
Proceedings of IEEE Infocom
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
9
-
-
4243199653
-
The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
-
April
-
J. Deng, R. Han and S. Mishra. "The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks". In the Proceedings of IPSN, April, 2003.
-
(2003)
Proceedings of IPSN
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
11
-
-
14844304757
-
-
To appear in second workshop on Security in Sensor and Ad-hoc Networks
-
R. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, P. Kruus. "TinyPK: Securing Sensor Networks with Public KeyTechnology". To appear in second workshop on Security in Sensor and Ad-hoc Networks, 2004.
-
(2004)
TinyPK: Securing Sensor Networks With Public KeyTechnology
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
12
-
-
37349069617
-
-
NESL Techanical Report, May
-
S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. "Location & Identity based Secure Event Report Generation for Sensor Networks". NESL Techanical Report, May 2004.
-
(2004)
Location & Identity Based Secure Event Report Generation For Sensor Networks
-
-
Ganeriwal, S.1
Kumar, R.2
Han, C.C.3
Lee, S.4
Srivastava, M.B.5
-
13
-
-
33847097895
-
-
The Seventeenth Asia Pacific Microwave Conference (APMC 2005) Suzhou, China, Dec
-
Haiguang Chen, Peng Han, Bo Yu, Chuanshan Gao "A New Kind of Session Keys Based on Message Scheme for Sensor Networks". The Seventeenth Asia Pacific Microwave Conference (APMC 2005) Suzhou, China, Dec. 4-7, 2005
-
(2005)
A New Kind of Session Keys Based On Message Scheme For Sensor Networks
, pp. 4-7
-
-
Chen, H.1
Han, P.2
Bo, Y.3
Gao, C.4
-
14
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Feb
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks", IEEE Wireless Communications, vol. 11, no. 1, pp. 48-60, Feb 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
16
-
-
0029700344
-
Decentralized Trust Management
-
Oakland, California, USA
-
M. Blaze, J. Feigenbaum, and J. Lacy. "Decentralized Trust Management". In Proceedings of IEEE Conf. Security and Privacy, Oakland, California, USA, 1996.
-
(1996)
Proceedings of IEEE Conf. Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
17
-
-
2442597363
-
Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks)
-
Lausanne, CH, June 2002
-
S. Buchegger and J.-Y. Le Boudec. "Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks)". Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.
-
Proceedings of MobiHoc 2002
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
19
-
-
84863050697
-
-
Will be appeared in Pacific Asian Workshop on ISI (PAISI 2007) Chengdu,China, April
-
Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao. Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. Will be appeared in Pacific Asian Workshop on ISI (PAISI 2007) Chengdu,China, April, 2007.
-
(2007)
Lightweight Anomaly Intrusion Detection In Wireless Sensor Networks
-
-
Chen, H.1
Han, P.2
Xi, Z.3
Gao, C.4
-
20
-
-
35148895900
-
Agent-based Trust Model In Wireless Sensor Networks
-
Qingdao, China, July
-
Haiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao. "Agent-based Trust Model in Wireless Sensor Networks". 8th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD2007)Qingdao, China, July 2007.
-
(2007)
8th International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD2007)
-
-
Chen, H.1
Huafeng, W.2
Xi, Z.3
Gao, C.4
|