-
1
-
-
84857206147
-
SenShare: Transforming sensor networks into multi-application sensing infrastructures
-
Springer Berlin/Heidelberg, Jun.
-
I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft, "SenShare: Transforming Sensor Networks into Multi-application Sensing Infrastructures," in Wireless Sensor Networks, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, Jun. 2012, vol. 7158, pp. 65-81.
-
(2012)
Wireless Sensor Networks, Ser. Lecture Notes in Computer Science
, vol.7158
, pp. 65-81
-
-
Leontiadis, I.1
Efstratiou, C.2
Mascolo, C.3
Crowcroft, J.4
-
3
-
-
78650911380
-
Constrained Application Protocol (CoAP)
-
Jun.
-
Z. Shelby, K. Hartke, C. Bormann, and B. Frank, "Constrained Application Protocol (CoAP)," Internet Engineering Task Force (IETF), Jun. 2012.
-
(2012)
Internet Engineering Task Force (IETF)
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
Frank, B.4
-
4
-
-
81255155987
-
Hydro: A hybrid routing protocol for low-power and lossy networks
-
Oct.
-
S. Dawson-Haggerty, A. Tavakoli, and D. Culler, "Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks," in Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Oct. 2010, pp. 268-273.
-
(2010)
Proceedings of the 1st IEEE International Conference on Smart Grid Communications
, pp. 268-273
-
-
Dawson-Haggerty, S.1
Tavakoli, A.2
Culler, D.3
-
5
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
Jan.-Mar.
-
D. R. Raymond and S. F. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," Pervasive Computing, vol. 7, no. 1, pp. 74-81, Jan.-Mar. 2008.
-
(2008)
Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
-
6
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
Apr.
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A Secure Sensor Network Communication Architecture," in Proceedings of the 6th International Conference on Information Processing in Sensor Networks, Apr. 2007, pp. 479-488.
-
(2007)
Proceedings of the 6th International Conference on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
7
-
-
33645091897
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
Dec.
-
V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, and S. C. Shantz, "Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet," Pervasive Mobile Computing, vol. 1, pp. 425-445, Dec. 2005.
-
(2005)
Pervasive Mobile Computing
, vol.1
, pp. 425-445
-
-
Gupta, V.1
Wurm, M.2
Zhu, Y.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Shantz, S.C.8
-
8
-
-
77956128351
-
Toward trustedwireless sensor networks
-
Aug.
-
W. Hu, H. Tan, P. Corke,W. C. Shih, and S. Jha, "Toward TrustedWireless Sensor Networks," ACM Transanctions on Sensor Networks, vol. 7, Aug. 2010.
-
(2010)
ACM Transanctions on Sensor Networks
, vol.7
-
-
Hu, W.1
Tan, H.2
Corke, P.3
Shih, W.C.4
Jha, S.5
-
9
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of the IEEE Symposium on Security and Privacy, 2003, pp. 197-213.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
10
-
-
70350132406
-
SSL-based lightweight security of ip-based wireless sensor networks
-
May
-
W. Jung, S. Hong, M. Ha, Y.-J. Kim, and D. Kim, "SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks," in Proceedings of the International Conference on Advanced Information Networking and Applications Workshops, May 2009, pp. 1112-1117.
-
(2009)
Proceedings of the International Conference on Advanced Information Networking and Applications Workshops
, pp. 1112-1117
-
-
Jung, W.1
Hong, S.2
Ha, M.3
Kim, Y.-J.4
Kim, D.5
-
15
-
-
33751508709
-
-
NIST, Tech. Rep., Mar.
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "NIST SP800-57: Recommendation for Key Management-Part 1: General(Revised)," NIST, Tech. Rep., Mar. 2007.
-
(2007)
NIST SP800-57: Recommendation for Key Management-Part 1: General(Revised)
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
16
-
-
84871266331
-
RPL: IPv6 routing protocol for low power and lossy networks
-
Mar.
-
T. Winter, P. Thubert, A. Brandt, T. Clausen, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, and J. Vasseur, "RPL: IPv6 Routing Protocol for Low Power and Lossy Networks," Internet Engineering Task Force (IETF), Mar. 2011.
-
(2011)
Internet Engineering Task Force (IETF)
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
Clausen, T.4
Hui, J.5
Kelsey, R.6
Levis, P.7
Pister, K.8
Struik, R.9
Vasseur, J.10
-
18
-
-
84555190402
-
Opal: A multiradio platform for high throughput wireless sensor networks
-
Dec.
-
R. Jurdak, K. Klues, B. Kusy, C. Richter, K. Langendoen, and M. Brünig, "Opal: A Multiradio Platform for High Throughput Wireless Sensor Networks," Embedded Systems Letters, IEEE, vol. 3, no. 4, pp. 121-124, Dec. 2011.
-
(2011)
Embedded Systems Letters, IEEE
, vol.3
, Issue.4
, pp. 121-124
-
-
Jurdak, R.1
Klues, K.2
Kusy, B.3
Richter, C.4
Langendoen, K.5
Brünig, M.6
-
19
-
-
34548356697
-
Energy evaluation of software implementations of block ciphers under memory constraints
-
Apr.
-
J. Großschädl, S. Tillich, C. Rechberger, M. Hofmann, and M. Medwed, "Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints," in Proceedings of the Conference on Design, Automation and Test in Europe, Apr. 2007, pp. 1110-1115.
-
(2007)
Proceedings of the Conference on Design, Automation and Test in Europe
, pp. 1110-1115
-
-
Großschädl, J.1
Tillich, S.2
Rechberger, C.3
Hofmann, M.4
Medwed, M.5
-
20
-
-
0036870095
-
Mica: A wireless platform for deeply embedded networks
-
Nov./Dec.
-
J. L. Hill and D. E. Culler, "Mica: A Wireless Platform for Deeply Embedded Networks," Micro, IEEE, vol. 22, no. 6, pp. 12-24, Nov./Dec. 2002.
-
(2002)
Micro, IEEE
, vol.22
, Issue.6
, pp. 12-24
-
-
Hill, J.L.1
Culler, D.E.2
|