-
2
-
-
58249109897
-
Rsda: Reputation-based secure data aggregation in wireless sensor networks
-
H. Alzaid, E. Foo, J. Nieto, Rsda: Reputation-based secure data aggregation in wireless sensor networks, in: International Conference on Parallel and Distributed Computing, Applications and Technologies, 2008, pp.419-424.
-
(2008)
International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 419-424
-
-
Alzaid, H.1
Foo, E.2
Nieto, J.3
-
3
-
-
78650024219
-
Enhancing resilience of probabilistic key pre-distribution schemes for wsns through hash chaining
-
ACM (Ed.)
-
W. Bechkit, A. Bouabdallah, Y. Challal, Enhancing resilience of probabilistic key pre-distribution schemes for wsns through hash chaining, in: ACM (Ed.), Proceedings of the 17th ACM conference on Computer and communications security, CCS 2010, 2010, pp. 642-644.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 642-644
-
-
Bechkit, W.1
Bouabdallah, A.2
Challal, Y.3
-
4
-
-
79955034773
-
An efficient and highly resilient key management scheme for wireless sensor networks
-
W. Bechkit, Y. Challal, A. Bouabdallah, A. Bencheikh, An efficient and highly resilient key management scheme for wireless sensor networks, in: Proceedings of the 35th IEEE Conference on Local Computer Networks, IEEE LCN 2010, 2010, pp. 220-223.
-
(2010)
Proceedings of the 35th IEEE Conference on Local Computer Networks, IEEE LCN 2010
, pp. 220-223
-
-
Bechkit, W.1
Challal, Y.2
Bouabdallah, A.3
Bencheikh, A.4
-
5
-
-
84865073708
-
-
memsic
-
memsic. http://www.memsic.com.
-
-
-
-
6
-
-
77950566866
-
A new approach to secure aggregation of private data in wireless sensor networks
-
R. Bista, K.-J. Jo, J.-W. Chang, A new approach to secure aggregation of private data in wireless sensor networks, in: Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on, 2009, pp. 394-399.
-
(2009)
Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on
, pp. 394-399
-
-
Bista, R.1
Jo, K.-J.2
Chang, J.-W.3
-
7
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, E. Mykletun, G. Tsudik, Efficient aggregation of encrypted data in wireless sensor networks, in: Mobile and Ubiquitous Systems: Networking and Services, INRIA, Cedex, France, 2005, pp. 109-117.
-
(2005)
Mobile and Ubiquitous Systems: Networking and Services, INRIA, Cedex, France
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
8
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
ACM Press New York, NY, USA
-
H. Chan, A. Perrig, and D. Song Secure hierarchical in-network aggregation in sensor networks Proceedings of the 13th ACM Conference on Computer and Communications Security 2006 ACM Press New York, NY, USA 278 287
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 278-287
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
9
-
-
33847255502
-
A practical study of transitory master key establishment for wireless sensor networks
-
J. Deng, C. Hartung, R. Han, S. Mishra, A practical study of transitory master key establishment for wireless sensor networks, in: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM 05, 2005, pp. 289-302.
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM 05
, pp. 289-302
-
-
Deng, J.1
Hartung, C.2
Han, R.3
Mishra, S.4
-
10
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J.D. Eng, Y.S. Han, V. Arshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 03, 2003, pp. 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 03
, pp. 42-51
-
-
Du, W.1
Eng, J.D.2
Han, Y.S.3
Arshney, V.4
-
13
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, K.S.J. Pister, System architecture directions for networked sensors, in: Proceedings of Architectural Support for Programming Languages and Operating Systems, 2000, pp. 93-104.
-
(2000)
Proceedings of Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
16
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems, SensSys 2004, 2004.
-
(2004)
Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems, SensSys 2004
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
18
-
-
51049098382
-
Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks
-
IEEE
-
E. Mlaih, and S. Aly Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks INFOCOM Workshops 2008 2008 IEEE 1 6
-
(2008)
INFOCOM Workshops 2008
, pp. 1-6
-
-
Mlaih, E.1
Aly, S.2
-
19
-
-
84865079220
-
-
World Scientific pp. 427-472
-
A. Ouadjaout, M. Bagaa, A. Bachir, Y. Challal, N. Lasla, and L. Khelladi Information Security in Wireless Sensor Networks 2009 World Scientific pp. 427-472
-
(2009)
Information Security in Wireless Sensor Networks
-
-
Ouadjaout, A.1
Bagaa, M.2
Bachir, A.3
Challal, Y.4
Lasla, N.5
Khelladi, L.6
-
20
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D.E. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of Mobile Computing and Networking, 2001, pp. 189-199.
-
(2001)
Proceedings of Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
22
-
-
47249161396
-
TOSSIM: Accurate and scalable simulation of entire tinyos applications
-
L. Philip, L. Nelson, W. Matt, C. David, TOSSIM: Accurate and scalable simulation of entire tinyos applications, in: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, SenSys 2003, 2003.
-
(2003)
Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, SenSys 2003
-
-
Philip, L.1
Nelson, L.2
Matt, W.3
David, C.4
-
23
-
-
33750404983
-
Secure data aggregation using commitment schemes and quasi commutative functions
-
M. Raina, S. Ghosh, R. Patro, G. Viswanath, T. Chadrashekhar, Secure data aggregation using commitment schemes and quasi commutative functions, in: 1st International Symposium on Wireless Pervasive Computing, 2006, p. 5.
-
(2006)
1st International Symposium on Wireless Pervasive Computing
, pp. 5
-
-
Raina, M.1
Ghosh, S.2
Patro, R.3
Viswanath, G.4
Chadrashekhar, T.5
-
24
-
-
38349028310
-
Secure data aggregation in wireless sensor networks: A survey
-
IEEE Computer Society Washington, DC, USA
-
Y. Sang, H. Shen, Y. Inoguchi, Y. Tan, and N. Xiong Secure data aggregation in wireless sensor networks: a survey Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies 2006 IEEE Computer Society Washington, DC, USA 315 320
-
(2006)
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 315-320
-
-
Sang, Y.1
Shen, H.2
Inoguchi, Y.3
Tan, Y.4
Xiong, N.5
-
25
-
-
26644435250
-
Simulating the power consumption of large-scale sensor network applications
-
ACM Press New York, NY, USA
-
V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, and M. Welsh Simulating the power consumption of large-scale sensor network applications Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems 2004 ACM Press New York, NY, USA 188 200
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 188-200
-
-
Shnayder, V.1
Hempstead, M.2
Chen, B.3
Allen, G.W.4
Welsh, M.5
-
26
-
-
33749986533
-
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
-
K. Wu, D. Dreefa, B. Sunb, and Y. Xiao Secure data aggregation without persistent cryptographic operations in wireless sensor networks Ad Hoc Networks 5 1 2006 100 111
-
(2006)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 100-111
-
-
Wu, K.1
Dreefa, D.2
Sunb, B.3
Xiao, Y.4
-
27
-
-
33748089962
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Y. Yang, X. Wang, S. Zhu, G. Cao, SDAP: A secure hop-by-hop data aggregation protocol for sensor networks, in: Proceedings of The ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2006.
-
(2006)
Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
28
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, S. Jajodia, LEAP: Efficient security mechanisms for large-scale distributed sensor networks, in: Proceedings of ACM CCS, 2003.
-
(2003)
Proceedings of ACM CCS
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|