-
3
-
-
0035365149
-
Self-organization in mobile ad hoc networks: The approach of terrninodes
-
L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J.-P. Hubaux, and J.Y. L. Boudec, "Self-organization in mobile ad hoc networks: The approach of terrninodes ", IEEE Communication Magazine, vol. 39, pp. 166-174,2001.
-
(2001)
IEEE Communication Magazine
, vol.39
, pp. 166-174
-
-
Blazevic, L.1
Buttyan, L.2
Capkun, S.3
Giordano, S.4
Hubaux, J.-P.5
Boudec, J.Y.L.6
-
4
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
S. Buchegger and J.-y' L. Boudec, "Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks," Proc. 10th Euromicro Workshop Parallel, Distributed Network-Based Processing, 2002, pp. 403-410.
-
(2002)
Proc. 10th Euromicro Workshop Parallel, Distributed Network-Based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
5
-
-
48049100992
-
Query privacy in wireless sensor networks
-
B. Carbunar, Y. Yu, L. Shi, M. Pearce, V. Vasudevan, "Query privacy in wireless sensor networks," Proc. 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007, pp. 203-212.
-
(2007)
Proc. 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, L.3
Pearce, M.4
Vasudevan, V.5
-
6
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig, "Security and privacy in Sensor Networks," IEEE Computer, vol. 36, no. 10, pp. 103-105,2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
7
-
-
0036739784
-
Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks
-
B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks," ACM Wireless Networks Journal, vol. 8, no. 5, pp. 481-494, 2002.
-
(2002)
ACM Wireless Networks Journal
, vol.8
, Issue.5
, pp. 481-494
-
-
Chen, B.1
Jamieson, K.2
Balakrishnan, H.3
Morris, R.4
-
8
-
-
84925443479
-
Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives
-
D. Christin, P. Mogre, and M. Hollick, "Survey on wireless sensor network technologies for industrial automation: The security and quality of service perspectives," Future Internet vol. 2, no. 2, pp. 96-125,2010.
-
(2010)
Future Internet
, vol.2
, Issue.2
, pp. 96-125
-
-
Christin, D.1
Mogre, P.2
Hollick, M.3
-
10
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
J. Deng, R. Han, S. Mishra, "Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks," Pervasive and Mobile Computing Elsevier, vol. 2, no. 2, pp 159-186,2000.
-
(2000)
Pervasive and Mobile Computing Elsevier
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
11
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
Deng, R. Han, S. Mishra, "Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks," IEEE International Conference on Dependable Systems and Networks, 2004, pp. 637-646.
-
(2004)
IEEE International Conference on Dependable Systems and Networks
, pp. 637-646
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
12
-
-
21644440888
-
Security for industrial communication systems
-
D. Dzung, M. Naedele, T. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proc. of the IEEE, vol. 93, no. 6, 2005,pp. 1152-1177.
-
(2005)
Proc. of the IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.3
Crevatin, M.4
-
15
-
-
12244263240
-
Efficient private matching and set intersection
-
MJ. Freedman, K. Nissim, B. Pinkas, "Efficient private matching and set intersection," Advances in Cryptography, Proceedings of Eurocrypt 2004, pp. 119.
-
(2004)
Advances in Cryptography, Proceedings of Eurocrypt
, pp. 119
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
17
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. KaInis, A. Khoshgozaran, C. Shahabi, Tan, Kian-Lee, "Private queries in location based services: anonymizers are not necessary," Proc. of the 2008 ACM SIGMOD international conference on Management of data, pp. 121-132.,2008.
-
(2008)
Proc. of the 2008 ACM SIGMOD International Conference on Management of Data
, pp. 121-132
-
-
Ghinita, G.1
Kainis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
18
-
-
85018204196
-
Anonymous usage of location-based services through spacial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spacial and temporal cloaking," Proc. of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003, pp. 3142.
-
(2003)
Proc. of the International Conference on Mobile Systems, Applications, and Services (MobiSys)
, pp. 3142
-
-
Gruteser, M.1
Grunwald, D.2
-
20
-
-
0029530159
-
A routing protocol for finding two node-disjoint paths in computer networks
-
K. Ishida, Y. Kakuda, and T. Kikuno, "A routing protocol for finding two node-disjoint paths in computer networks," Proc. of Network Protocols, 1992, pp. 340-347.
-
(1992)
Proc. of Network Protocols
, pp. 340-347
-
-
Ishida, K.1
Kakuda, Y.2
Kikuno, T.3
-
21
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
Y. Jian, S.G. Chen, Z. Zhang, L. Zhang, "Protecting receiver-location privacy in wireless sensor networks," Proc. of the 26th IEEE International Conference on Computer Communications, 2007, pp. 1955-1963.
-
(2007)
Proc. of the 26th IEEE International Conference on Computer Communications
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.G.2
Zhang, Z.3
Zhang, L.4
-
22
-
-
34848852681
-
Temporal privacy in wireless sensor networks
-
P. Kamat, W. Xu, W. Trappe, Y. Zhang, "Temporal privacy in wireless sensor networks," Proc. of the 27th International Conference on Distributed Computing Systems, 2007, pp. 23-23.
-
(2007)
Proc. of the 27th International Conference on Distributed Computing Systems
, pp. 23-23
-
-
Kamat, P.1
Xu, W.2
Trappe, W.3
Zhang, Y.4
-
23
-
-
84945556728
-
Privacy by design principles of privacy aware ubiquitous systems
-
M. Langeheinrich, "Privacy by Design Principles of Privacy Aware Ubiquitous Systems," Proc. in UBICOMP, 2001. pp. 273-291.
-
(2001)
Proc. in UBICOMP
, pp. 273-291
-
-
Langeheinrich, M.1
-
24
-
-
0022130080
-
A data distortion by probability distribution
-
C. Liew, U. Choi, and C. Liew, "A data distortion by probability distribution," ACM Transaction Database System, vol. 10, no. 3, pp. 395-411,1985.
-
(1985)
ACM Transaction Database System
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.1
Choi, U.2
Liew, C.3
-
26
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," Proc. 6th Annual International Conference Mobile Computing Networking, 2000, pp. 255-265.
-
(2000)
Proc. 6th Annual International Conference Mobile Computing Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
28
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Proc. Advanced Communication Multimedia Security, 2002, pp. 107-121.
-
(2002)
Proc. Advanced Communication Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
29
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham, M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, no. 12, pp. 993-999.,1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
30
-
-
33847279474
-
Security, privacy and trust issues in smart environments
-
Chapter in, D. Cooke and S. Das (Eds), Pearson Press
-
P. Nixon, W. Wagealla, C. English and S. Terzis, "Security, Privacy and Trust Issues in Smart Environments," Chapter in Smart Environments, D. Cooke and S. Das (Eds), Pearson Press, 2004.
-
(2004)
Smart Environments
-
-
Nixon, P.1
Wagealla, W.2
English, C.3
Terzis, S.4
-
32
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, D. Wagner, "Security in Wireless Sensor Networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
35
-
-
3042738543
-
SWATT: Softwarebased attestation for embedded devices
-
A. Seshadri, A. Perrig, L. Doom, and P. Khosla, "SWATT: SoftWarebased ATTestation for embedded devices," Proc. IEEE Symposium Security Privacy, 2004, pp. 272-282.
-
(2004)
Proc. IEEE Symposium Security Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Doom, L.3
Khosla, P.4
-
36
-
-
34548302064
-
PDCS: Security and privacy support for data-centric sensor networks
-
M. Shao, S. Zhu, W. Zhang, G. Cao, "pDCS: security and privacy support for data-centric sensor networks,' Proc. of the 26th IEEE International Conference on Computer Communications, 2007, pp.1298-1306.
-
(2007)
Proc. of the 26th IEEE International Conference on Computer Communications
, pp. 1298-1306
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
37
-
-
70249093182
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, G. Cao, "Towards statistically strong source anonymity for sensor networks," Proc. of the 26th IEEE International Conference on Computer Communications 2007, pp. 1298-1306.
-
(2007)
Proc. of the 26th IEEE International Conference on Computer Communications
, pp. 1298-1306
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
38
-
-
11144340927
-
Designing secure networks
-
E. Shi, A. Perrig, "Designing secure networks," In IEEE Wireless Communications, vol. 11, no.6, pp. 38-43, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
39
-
-
36849024896
-
Sensor node compromise detection: The location perspective
-
H. Song, L. Xie, S. Zhu, and G. Cao, "Sensor node compromise detection: The location perspective," Proc. International Conf. Wireless Communication Mobile Computing, 2007, pp. 242-247.
-
(2007)
Proc. International Conf. Wireless Communication Mobile Computing
, pp. 242-247
-
-
Song, H.1
Xie, L.2
Zhu, S.3
Cao, G.4
-
41
-
-
70549097650
-
-
Report compiled within the Specific Support Action "Ambient Assisted Living preparation of an article 169-initiative," Berlin
-
H. Steg, H. Strese, H. Loroff, 1. Hull and S. Schmidt, "Europe is facing a demographic challenge. Ambient assisted living offers solutions," Report compiled within the Specific Support Action "Ambient Assisted Living preparation of an article 169-initiative," Berlin, 2006.
-
(2006)
Europe Is Facing A Demographic Challenge. Ambient Assisted Living Offers Solutions
-
-
Steg, H.1
Strese, H.2
Loroff, H.3
Hull, J.4
Schmidt, S.5
-
44
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
M. Weiser, "Some computer science issues in ubiquitous computing," Communications of the ACM, vol. 36, no. 7, pp. 75-84, 2003.
-
(2003)
Communications of the ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
-
46
-
-
0036793924
-
Denial of service in sensor networks
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62,2002.
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
|