-
1
-
-
33749525209
-
Efficient Aggregation of Encrypted Data in Wireless Sensor Networks.
-
Castelluccia, C., Mykletun, E.&Tsudik, G. (2005), Efficient Aggregation of Encrypted Data in Wireless Sensor Networks., in 'MobiQuitous', IEEE Computer Society, pp. 109-117.
-
(2005)
MobiQuitous, IEEE Computer Society
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
2
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks.
-
Chan, H., Perrig, A.&Song, D. (2006), Secure hierarchical in-network aggregation in sensor networks., in A. Juels, R. N. Wright&S. D. C. di Vimercati, eds, 'ACM Conference on Computer and Communications Security', ACM, pp. 278-287.
-
(2006)
A. Juels, R. N. Wright&S. D. C. di Vimercati, eds, 'ACM Conference on Computer and Communications Security', ACM
, pp. 278-287
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
3
-
-
84871239255
-
Mica2 datasheet
-
Corporation, C. (2006), 'Mica2 datasheet'.Reviewed 10th of October 2007, http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf.
-
(2006)
Reviewed 10th of October 2007
-
-
Corporation, C.1
-
4
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism.
-
Domingo-Ferrer, J. (2002), A provably secure additive and multiplicative privacy homomorphism., in A. H. Chan&V. D. Gligor, eds, 'ISC', Vol. 2433 of Lecture Notes in Computer Science, Springer, pp. 471-483.
-
(2002)
A. H. Chan&V. D. Gligor, eds, 'ISC', Vol. 2433 of Lecture Notes in Computer Science, Springer
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
5
-
-
0842332407
-
A witness-based approach for data fusion assurance in wireless sensor networks
-
Du, W., Deng, J., Han, Y. S.&Varshney, P. (2003), A witness-based approach for data fusion assurance in wireless sensor networks, in 'IEEE Global Communications Conference (GLOBECOM)', Vol. 3, pp. 1435-1439.
-
(2003)
IEEE Global Communications Conference (GLOBECOM)
, vol.3
, pp. 1435-1439
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
6
-
-
84871233253
-
Homomorphic public-key cryptosystems over groups and rings
-
Grigoriev, D.&Ponomarenko, I. V. (2003), 'Homomorphic public-key cryptosystems over groups and rings', CoRR cs.CR/0309010.
-
(2003)
CoRR cs.CR/0309010
-
-
Grigoriev, D.1
Ponomarenko, I.V.2
-
7
-
-
33646918331
-
Evaluation of security mechanisms in wireless sensor networks.
-
Guimar̃aes, G., Souto, E., Sadok, D. F. H.&Kelner, J. (2005), Evaluation of security mechanisms in wireless sensor networks., in 'ICW/ICHSN/ICMCS/SENET', IEEE Computer Society, pp. 428-433.
-
(2005)
ICW/ICHSN/ICMCS/SENET, IEEE Computer Society
, pp. 428-433
-
-
Guimar̃aes, G.1
Souto, E.2
Sadok, D.F.H.3
Kelner, J.4
-
8
-
-
33749595383
-
Achieving real-time target tracking usingwireless sensor networks.
-
He, T., Vicaire, P., Yan, T., Luo, L., Gu, L., Zhou, G., Stoleru, R., Cao, Q., Stankovic, J. A.&Abdelzaher, T. F. (2006), Achieving real-time target tracking usingwireless sensor networks., in 'IEEE Real Time Technology and Applications Symposium', IEEE Computer Society, pp. 37-48.
-
(2006)
'IEEE Real Time Technology and Applications Symposium', IEEE Computer Society
, pp. 37-48
-
-
He, T.1
Vicaire, P.2
Yan, T.3
Luo, L.4
Gu, L.5
Zhou, G.6
Stoleru, R.7
Cao, Q.8
Stankovic, J.A.9
Abdelzaher, T.F.10
-
9
-
-
84943753034
-
Secure aggregation for wireless network
-
Hu, L.&Evans, D. (2003), Secure aggregation for wireless network., in 'SAINT Workshops', IEEE Computer Society, pp. 384-394.
-
(2003)
SAINT Workshops, IEEE Computer Society
, pp. 384-394
-
-
Hu, L.1
Evans, D.2
-
10
-
-
35048828372
-
Efficient secure aggregation in sensor networks
-
of Lecture Notes in Computer Science, Springer
-
Jadia, P.&Mathuria, A. (2004), Efficient secure aggregation in sensor networks., in L. Bougè&V. K. Prasanna, eds, 'HiPC', Vol. 3296 of Lecture Notes in Computer Science, Springer, pp. 40-49.
-
(2004)
L. Bougè&V. K. Prasanna, eds, 'HiPC'
, vol.3296
, pp. 40-49
-
-
Jadia, P.1
Mathuria, A.2
-
11
-
-
84994296501
-
The impact of data aggregation in wireless sensor networks
-
Krishnamachari, B., Estrin, D.&Wicker, S. B. (2002), The impact of data aggregation in wireless sensor networks., in 'ICDCSWorkshops', IEEE Computer Society, pp. 575-578.
-
(2002)
ICDCSWorkshops, IEEE Computer Society
, pp. 575-578
-
-
Krishnamachari, B.1
Estrin, D.2
Wicker, S.B.3
-
12
-
-
18144428307
-
Secure-DAV: A secure data aggregation and verification protocol for sensor networks
-
Mahimkar, A.&Rappaport, T. S. (2004), Secure-DAV: A secure data aggregation and verification protocol for sensor networks., in 'Global Telecommunications Conference', Vol. 4, pp. 2175-2179.
-
(2004)
'Global Telecommunications Conference
, vol.4
, pp. 2175-2179
-
-
Mahimkar, A.1
Rappaport, T.S.2
-
13
-
-
0036986465
-
Wireless sensor networks for habitat monitoring
-
Mainwaring, A. M., Culler, D. E., Polastre, J., Szewczyk, R.&Anderson, J. (2002), Wireless sensor networks for habitat monitoring., in C. S. Raghavendra&K. M. Sivalingam, eds, 'WSNA', ACM, pp. 88-97.
-
(2002)
C. S. Raghavendra&K. M. Sivalingam, eds, 'WSNA', ACM
, pp. 88-97
-
-
Mainwaring, A.M.1
Culler, D.E.2
Polastre, J.3
Szewczyk, R.4
Anderson, J.5
-
14
-
-
84871220920
-
Ad Hoc Wireless Sensor Networks Architectures and Protocols
-
Murthy, C. S. R.&Manoj, B. (2004), Ad Hoc Wireless Sensor Networks Architectures and Protocols, Prentice Hall PTR, Upper Saddle River, NJ, USA.
-
(2004)
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
-
Murthy, C.S.R.1
Manoj, B.2
-
15
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks.
-
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V.&Culler, D. E. (2002), 'SPINS: Security Protocols for Sensor Networks.', Wireless Network 8(5), 521-534.
-
(2002)
Wireless Network
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
16
-
-
18844457825
-
SIA: Secure Information Aggregation in Sensor Networks
-
Przydatek, B., Song, D. X.&Perrig, A. (2003), SIA: Secure Information Aggregation in Sensor Networks., in I. F. Akyildiz, D. Estrin, D. E. Culler&M. B. Srivastava, eds, 'SenSys', ACM, pp. 255-265.
-
(2003)
I. F. Akyildiz, D. Estrin, D. E. Culler&M. B. Srivastava, eds, 'SenSys', ACM
, pp. 255-265
-
-
Przydatek, B.1
Song, D.X.2
Perrig, A.3
-
17
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
-
Rivest, R. L., Shamir, A.&Adleman, L. M. (1978), 'A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.', Communication. ACM 21(2), 120-126.
-
(1978)
Communication. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
58449099938
-
Taxonomy of security attacks in sensor networks
-
IEEE International, Washington, DC, USA
-
Roosta, T., Shieh, S.&Sastry, S. (2006), Taxonomy of security attacks in sensor networks, in 'The First IEEE International Conference on System Integration and Reliability Improvements', IEEE International, Washington, DC, USA.
-
(2006)
'The First IEEE International Conference on System Integration and Reliability Improvements'
-
-
Roosta, T.1
Shieh, S.2
Sastry, S.3
-
19
-
-
38349028310
-
Secure data aggregation in wireless sensor networks: A survey
-
IEEE Computer Society,Washington, DC, USA
-
Sang, Y., Shen, H., Inoguchi, Y., Tan, Y.&Xiong, N. (2006), Secure data aggregation in wireless sensor networks: A survey, in 'Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '06)', IEEE Computer Society,Washington, DC, USA, pp. 315-320.
-
(2006)
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '06)
, pp. 315-320
-
-
Sang, Y.1
Shen, H.2
Inoguchi, Y.3
Tan, Y.4
Xiong, N.5
-
20
-
-
17144429336
-
SRDA: Secure reference-based data aggregation protocol for wireless sensor networks
-
Sanli, H. O., Ozdemir, S.&Cam, H. (2004), SRDA: Secure reference-based data aggregation protocol for wireless sensor networks, in 'Vehicular Technology Conference', pp. 4650-4654.
-
(2004)
Vehicular Technology Conference
, pp. 4650-4654
-
-
Sanli, H.O.1
Ozdemir, S.2
Cam, H.3
-
21
-
-
11144340927
-
Designing secure sensor networks.
-
Shi, E.&Perrig, A. (2004), 'Designing secure sensor networks.', IEEE Personal Communications 11(6), 38-43.
-
(2004)
IEEE Personal Communications
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
22
-
-
29144433598
-
Cryptanalysis of an algebraic privacy homomorphism
-
Wagner, D. (2003), Cryptanalysis of an algebraic privacy homomorphism., in C. Boyd&W. Mao, eds, 'ISC', Vol. 2851 of Lecture Notes in Computer Science, Springer, pp. 234-239.
-
(2003)
C. Boyd&W. Mao, eds, 'ISC', Vol. 2851 of Lecture Notes in Computer Science, Springer
, pp. 234-239
-
-
Wagner, D.1
-
23
-
-
14844300164
-
Resilient aggregation in sensor networks
-
Wagner, D. (2004), Resilient aggregation in sensor networks., in S. Setia&V. Swarup, eds, 'SASN', ACM, pp. 78-87.
-
(2004)
S. Setia&V. Swarup, eds, 'SASN', ACM
, pp. 78-87
-
-
Wagner, D.1
-
24
-
-
33748351402
-
'Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation'
-
Westhoff, D., Girao, J.&Acharya, M. (2006), 'Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation', IEEE Transactions on Mobile Computing 05(10), 1417-1431.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
25
-
-
33748089962
-
SDAP: a secure hop-by-hop data aggregation protocol for sensor networks
-
MobiHoc 2006, Florence, Italy, May 22-25, 2006', ACM
-
Yang, Y.,Wang, X., Zhu, S.&Cao, G. (2006), SDAP: a secure hop-by-hop data aggregation protocol for sensor networks., in 'Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2006, Florence, Italy, May 22-25, 2006', ACM, pp. 356-367.
-
(2006)
'Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing
, pp. 356-367
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
|