-
1
-
-
84863052671
-
Secure multidimensional range queries in sensor networks
-
New Orleans, LA, May
-
R. Zhang, J. Shi, and Y. Zhang, "Secure multidimensional range queries in sensor networks," in ACM MobiHoc'09, New Orleans, LA, May 2009.
-
(2009)
ACM MobiHoc'09
-
-
Zhang, R.1
Shi, J.2
Zhang, Y.3
-
2
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
Hong Kong, China, Mar.
-
R. D. Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch me (if you can): Data survival in unattended sensor networks," in PerCom'08, Hong Kong, China, Mar. 2008, pp. 185-194.
-
(2008)
PerCom'08
, pp. 185-194
-
-
Pietro, R.D.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
3
-
-
65249138169
-
New adversary and new threats: Security in unattended sensor networks
-
D. Ma, C. Soriente, and G. Tsudik, "New adversary and new threats: security in unattended sensor networks," IEEE Network, vol. 23, no. 2, pp. 43-48, 2009.
-
(2009)
IEEE Network
, vol.23
, Issue.2
, pp. 43-48
-
-
Ma, D.1
Soriente, C.2
Tsudik, G.3
-
4
-
-
84905852894
-
TSAR: A two tier sensor storage architecture using interval skip graphs
-
San Diego, California, USA, Nov.
-
P. Desnoyers, D. Ganesan, and P. Shenoy, "TSAR: A two tier sensor storage architecture using interval skip graphs," in ACM SenSys'05, San Diego, California, USA, Nov. 2005, pp. 39-50.
-
(2005)
ACM SenSys'05
, pp. 39-50
-
-
Desnoyers, P.1
Ganesan, D.2
Shenoy, P.3
-
5
-
-
74249122684
-
Data storage placement in sensor networks
-
Florence, Italy, May
-
B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006.
-
(2006)
ACM MobiHoc'06
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
-
6
-
-
34548302064
-
PDCS: Security and privacy support for data-centric sensor networks
-
DOI 10.1109/INFCOM.2007.154, 4215736, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007, pp. 1298-1306. (Pubitemid 47334354)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1298-1306
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
7
-
-
70349652889
-
Verifiable privacy-preserving range query in sensor networks
-
Phoenix, AZ, Apr.
-
B. Sheng and Q. Li, "Verifiable privacy-preserving range query in sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008, pp. 46-50.
-
(2008)
IEEE INFOCOM'08
, pp. 46-50
-
-
Sheng, B.1
Li, Q.2
-
8
-
-
47849097166
-
The tenet architecture for tiered sensor networks
-
Colorado, USA, Oct.
-
O. Gnawali, K.-Y. Jang, J. Paek, M. Vieira, R. Govindan, B. Greenstein, A. Joki, D. Estrin, and E. Kohler, "The tenet architecture for tiered sensor networks," in ACM SenSys'06, Boulder, Colorado, USA, Oct. 2006.
-
(2006)
ACM SenSys'06, Boulder
-
-
Gnawali, O.1
Jang, K.-Y.2
Paek, J.3
Vieira, M.4
Govindan, R.5
Greenstein, B.6
Joki, A.7
Estrin, D.8
Kohler, E.9
-
9
-
-
4243197464
-
Multi-dimensional range queries in sensor networks
-
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
-
X. Li, Y. J. Kim, R. Govindan, and W. Hong, "Multi-dimensional range queries in sensor networks," in ACM SenSys'03, Los Angeles, California, USA, Nov. 2003, pp. 63-75. (Pubitemid 40682335)
-
(2003)
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
, pp. 63-75
-
-
Li, X.1
Kim, Y.J.2
Govindan, R.3
Hong, W.4
-
10
-
-
23944487783
-
TinyDB: An acquisitional query processing system for sensor networks
-
DOI 10.1145/1061318.1061322
-
S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: an acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005. (Pubitemid 41201813)
-
(2005)
ACM Transactions on Database Systems
, vol.30
, Issue.1
, pp. 122-173
-
-
Madden, S.R.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
11
-
-
70349690087
-
Secure range queries in tiered sensor networks
-
Rio de Janeiro, Brazil, Apr.
-
J. Shi, R. Zhang, and Y. Zhang, "Secure range queries in tiered sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
IEEE INFOCOM'09
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
12
-
-
78651506283
-
A spatiotemporal approach for secure range queries in tiered sensor networks
-
Jan.
-
-. "A spatiotemporal approach for secure range queries in tiered sensor networks," IEEE Trans. Wireless Commun., vol. 10, no. 1, pp. 264-273, Jan. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.1
, pp. 264-273
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
13
-
-
77953310348
-
SafeQ: Secure and efficient query processing in sensor networks
-
F. Chen and A. Liu, "SafeQ: Secure and efficient query processing in sensor networks," in INFOCOM'10, San Diego, CA, Mar. 2010, pp. 1-9.
-
(2010)
INFOCOM'10, San Diego, CA, Mar.
, pp. 1-9
-
-
Chen, F.1
Liu, A.2
-
14
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacig̈um̈us, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in ACM SIGMOD'02, Madison, Wisconsin, 6 2002, pp. 216-227. (Pubitemid 34985549)
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
15
-
-
85065578926
-
A privacy-preserving index for range queries
-
Toronto, Canada, Aug.
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in VLDB'04, Toronto, Canada, Aug. 2004, pp. 720-731.
-
(2004)
VLDB'04
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
16
-
-
33144467903
-
Attack-resistant location estimation in sensor networks
-
Los Angeles, CA, Apr.
-
D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in sensor networks," in IPSN'05, Los Angeles, CA, Apr. 2005.
-
(2005)
IPSN'05
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
17
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
DOI 10.1109/JSAC.2005.863855
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Sel. Areas Commun., Special Issue on UWB Wireless Communications-Theory and Applications, vol. 24, no. 4, pp. 829-835, Apr. 2006. (Pubitemid 46438080)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
18
-
-
77950169459
-
Random key predistribution schemes for sensor networks
-
Oakland, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE S&P'03, Oakland, CA, May 2003.
-
(2003)
IEEE S&P'03
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
19
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 62-72. (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
20
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromisetolerant security mechanisms for wireless sensor networks," IEEE J. Sel. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
21
-
-
34548205306
-
iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks
-
DOI 10.1109/TPDS.2007.1063
-
L. Ma, X. Cheng, F. Liu, F. An, and M. Rivera, "iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1174-1184, Aug. 2007. (Pubitemid 47315997)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.8
, pp. 1174-1184
-
-
Ma, L.1
Cheng, X.2
Liu, F.3
An, F.4
Rivera, J.5
-
22
-
-
70349658629
-
DP2AC: Distributed privacypreserving access control in sensor networks
-
Rio de Janeiro, Brazil, Apr.
-
R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed privacypreserving access control in sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
IEEE INFOCOM'09
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
23
-
-
77953304573
-
Verifiable fine-grained top-k queries in tiered sensor networks
-
San Diego, CA, Mar.
-
R. Zhang, J. Shi, Y. Liu, and Y. Zhang, "Verifiable fine-grained top-k queries in tiered sensor networks," in INFOCOM'10, San Diego, CA, Mar. 2010.
-
(2010)
INFOCOM'10
-
-
Zhang, R.1
Shi, J.2
Liu, Y.3
Zhang, Y.4
-
24
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Aug.
-
P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, Aug. 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
25
-
-
85000276942
-
Multilevel ?TESLA: Broadcast authentication for distributed sensor networks
-
D. Liu and P. Ning, "Multilevel ?TESLA: Broadcast authentication for distributed sensor networks," Trans. Embedded Computing Sys., vol. 3, no. 4, pp. 800-836, 2004.
-
(2004)
Trans. Embedded Computing Sys.
, vol.3
, Issue.4
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
|