-
1
-
-
77954519992
-
An integration framework for sensor networks and data stream management systems
-
Toronto, Canada, August
-
Abadi, D.J., Lindner, W., Madden, S., and Schuler, J.: ' An integration framework for sensor networks and data stream management systems ', Proc. 13th Int. Conf. Very Large Data Bases, Toronto, Canada, August, 2004, p. 1361-1364
-
(2004)
Proc. 13th Int. Conf. Very Large Data Bases
, pp. 1361-1364
-
-
Abadi, D.J.1
Lindner, W.2
Madden, S.3
Schuler, J.4
-
2
-
-
84863569554
-
-
IPv6 over Low power WPAN (6lowpan) Working Group accessed September 2011
-
IPv6 over Low power WPAN (6lowpan) Working Group, http://datatracker. ietf.org/wg/6lowpan/charter/, accessed September 2011
-
-
-
-
3
-
-
46449128945
-
Transmission of IPv6 packets over IEEE 802.15.4 networks
-
Montenegro, G., Kushalnagar, N., Hui, J., and Culler, D.: ' Transmission of IPv6 packets over IEEE 802.15.4 networks ', RFC 4944, 2007
-
(2007)
RFC 4944
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
4
-
-
33750963358
-
The Kerberos network authentication service (v5)
-
Neuman, C., Hartman, S., and Raeburn, K.: ' The Kerberos network authentication service (v5) ', RFC 4120, 2005
-
(2005)
RFC 4120
-
-
Neuman, C.1
Hartman, S.2
Raeburn, K.3
-
5
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu, S., Setia, S., and Jajodia, S.: ' LEAP: efficient security mechanisms for large-scale distributed sensor networks ', Proc. Tenth ACM Conf. Computer and Communications Security (CCS' 03), Washington D.C., USA, October, 2003, p. 62-72 (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
6
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
10.1023/A:1016598314198
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., and Culler, D.E.: ' SPINS: security protocols for sensor networks ', ACM Wirel. Netw., 2002, 8, (5), p. 521-534 10.1023/A:1016598314198
-
(2002)
ACM Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
7
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Karlof, C., Sastry, N., and Wagner, D.: ' TinySec: a link layer security architecture for wireless sensor networks ', Proc. Second Int. Conf. Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, USA, November, 2004, p. 162-175 (Pubitemid 41563357)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
8
-
-
0002494222
-
A nonce-based protocol for multiple authentications
-
10.1145/142854.142872
-
Kehne, A., Schönwälder, J., and Langendörfer, H.: ' A nonce-based protocol for multiple authentications ', ACM SIGOPS Oper. Syst. Rev., 1992, 26, (4), p. 84-89 10.1145/142854.142872
-
(1992)
ACM SIGOPS Oper. Syst. Rev.
, vol.26
, Issue.4
, pp. 84-89
-
-
Kehne, A.1
Schönwälder, J.2
Langendörfer, H.3
-
9
-
-
0002088427
-
A note on the use of timestamps as nonces
-
10.1145/155848.155852 0163-5980
-
Neuman, B.C., and Stubblebine, S.G.: ' A note on the use of timestamps as nonces ', Oper. Syst. Rev., 1993, 27, (2), p. 10-14 10.1145/155848.155852 0163-5980
-
(1993)
Oper. Syst. Rev.
, vol.27
, Issue.2
, pp. 10-14
-
-
Neuman, B.C.1
Stubblebine, S.G.2
-
10
-
-
0028466968
-
SESAME: The solution to security for open distributed systems
-
10.1016/0140-3664(94)90105-8
-
Kaijser, P., Parker, T., and Pinkas, D.: ' SESAME: the solution to security for open distributed systems ', Comput. Commun., 1994, 17, (7), p. 501-518 10.1016/0140-3664(94)90105-8
-
(1994)
Comput. Commun.
, vol.17
, Issue.7
, pp. 501-518
-
-
Kaijser, P.1
Parker, T.2
Pinkas, D.3
-
11
-
-
84863582936
-
IDfusion, an open-architecture for Kerberos based authorization
-
Michigan, USA, June
-
Wettstein, G.H., Grosen, J., and Rodriguez, E.: ' IDfusion, an open-architecture for Kerberos based authorization ', Proc. AFS and Kerberos Best Practices Workshop, Michigan, USA, June, 2006
-
(2006)
Proc. AFS and Kerberos Best Practices Workshop
-
-
Wettstein, G.H.1
Grosen, J.2
Rodriguez, E.3
-
12
-
-
0027316628
-
Proxy-based authorization and accounting for distributed systems
-
Pittsburgh, USA, May
-
Neuman, C.: ' Proxy-based authorization and accounting for distributed systems ', Proc. 13th Int. Conf. Distributed Computing Systems, Pittsburgh, USA, May, 1993, p. 283-291
-
(1993)
Proc. 13th Int. Conf. Distributed Computing Systems
, pp. 283-291
-
-
Neuman, C.1
-
13
-
-
84863578134
-
-
Windows 2000 Advantage Magazine
-
Walla, M.: ' Kerberos explained ', 2000, Windows 2000 Advantage Magazine
-
(2000)
Kerberos Explained
-
-
Walla, M.1
-
15
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Shnayder, V., Hempstead, M., Chen, B.-r., Allen, G.W., and Welsh, M.: ' Simulating the power consumption of large-scale sensor network applications ', Proc. Second Int. Conf. Embedded Networked Sensor Systems, (SenSys 2004), Baltimore, MD, USA, November, 2004, p. 188-200 (Pubitemid 41563359)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.-R.3
Allen, G.W.4
Welsh, M.5
-
16
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
10.1145/501978.501980 1094-9224
-
Ferriarolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D., and Chandramouli, R.: ' Proposed NIST standard for role-based access control ', ACM Trans. Inf. Syst. Secur., 2001, 4, (3), p. 224-274 10.1145/501978.501980 1094-9224
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferriarolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
17
-
-
20444479906
-
A logic-based framework for attribute based access control
-
FMSE'04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
-
Wang, L., Wijesekera, D., and Jajodia, S.: ' A logic-based framework for attribute based access control ', Proc. ACM Workshop on Formal Methods in Security Engineering (FMSE'04), Washington DC., USA, October, 2004, p. 45-55 (Pubitemid 40821073)
-
(2004)
FMSE'04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 45-55
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
18
-
-
33646227667
-
Automated security protocol analysis with the AVISPA tool
-
10.1016/j.entcs.2005.11.052 1571-0661
-
Viganò, L.: ' Automated security protocol analysis with the AVISPA tool ', Electron. Notes Theor. Comput. Sci., 2006, 155, p. 61-86 10.1016/j.entcs.2005.11.052 1571-0661
-
(2006)
Electron. Notes Theor. Comput. Sci.
, vol.155
, pp. 61-86
-
-
Viganò, L.1
|