-
2
-
-
83455223437
-
Demo abstract: A mesh-based command and control sensing system for public safety scenarios
-
N. Aschenbruck, J. Bauer, R. Ernst, C. Fuchs, and J. Kirchhoff, "Demo Abstract: A Mesh-based Command and Control Sensing System for Public Safety Scenarios," in Proc. of the 9th ACM Conference on Embedded Networked Sensor Systems, 2011.
-
(2011)
Proc. of the 9th ACM Conference on Embedded Networked Sensor Systems
-
-
Aschenbruck, N.1
Bauer, J.2
Ernst, R.3
Fuchs, C.4
Kirchhoff, J.5
-
4
-
-
84874316406
-
Secure multi-hop infrastructure access
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "Secure Multi-Hop Infrastructure Access," Proceedings of Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
9
-
-
84874322986
-
-
(2011, November) Cpu limit
-
(2011, November) Cpu limit. [Online]. Available: http://cpulimit. sourceforge.net/
-
-
-
-
10
-
-
84874325047
-
-
(2010) Crypto++ Library 5.6.1-a Free C++ Class Library of Cryptographic Schemes
-
(2010) Crypto++ Library 5.6.1-a Free C++ Class Library of Cryptographic Schemes. [Online]. Available: http://www.cryptopp.com/
-
-
-
-
12
-
-
27544440245
-
INsens: Intrusion-tolerant routing in wireless sensor networks
-
Tech. Rep. CU-CS-939-02
-
J. Deng, R. Han, and S. Mishra, "INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks," Department of Computer Science, University of Colorado, Tech. Rep. CU-CS-939-02, 2002.
-
(2002)
Department of Computer Science, University of Colorado
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
13
-
-
79960416739
-
TOGBAD-an approach to detect routing attacks in tactical environments
-
Aug.
-
E. Gerhards-Padilla, N. Aschenbruck, and P. Martini, "TOGBAD-An Approach to Detect Routing Attacks in Tactical Environments," Wiley Security and Communication Networks, vol. 4, no. 8, pp. 793-806, Aug. 2011.
-
(2011)
Wiley Security and Communication Networks
, vol.4
, Issue.8
, pp. 793-806
-
-
Gerhards-Padilla, E.1
Aschenbruck, N.2
Martini, P.3
-
16
-
-
27344459927
-
Performance and energy efficiency of block ciphers in personal digital assistants
-
C. T. R. Hager, S. F. Midkiff, J.-M. Park, and T. L. Martin, "Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants," in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 2005, pp. 127-136.
-
(2005)
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE
, pp. 127-136
-
-
Hager, C.T.R.1
Midkiff, S.F.2
Park, J.-M.3
Martin, T.L.4
-
19
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
22
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, "Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks," Algorithmic Aspects of Wireless Sensor Networks, vol. 48372008, 2008.
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks
, vol.4837
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
23
-
-
56749178548
-
Launching a sinkhole attack in wireless sensor networks; The intruder side
-
I. Krontiris, T. Giannetsos, and T. Dimitriou, "Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side," Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WIMOB), 2008.
-
(2008)
Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WIMOB)
-
-
Krontiris, I.1
Giannetsos, T.2
Dimitriou, T.3
-
24
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Y. W. Law, J. Doumen, and P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 1, pp. 65-93, 2006.
-
(2006)
ACM Transactions on Sensor Networks (TOSN)
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
26
-
-
84874319166
-
-
(2011) OpenSSL: The Open Source toolkit for SSL/TLS
-
(2011) OpenSSL: The Open Source toolkit for SSL/TLS. [Online]. Available: http://www.openssl.org/
-
-
-
-
28
-
-
84891993846
-
Routing security in ad hoc wireless networks
-
S. C.-H. Huang, D. MacCallum, and D.-Z. Du, Eds. Springer Science+Business Media
-
M. O. Pervaiz, M. Cardei, and J. Wu, "Routing Security in Ad Hoc Wireless Networks," in Network Security, S. C.-H. Huang, D. MacCallum, and D.-Z. Du, Eds. Springer Science+Business Media, 2010, pp. 117-142.
-
(2010)
Network Security
, pp. 117-142
-
-
Pervaiz, M.O.1
Cardei, M.2
Wu, J.3
-
31
-
-
14844323027
-
An advanced signature system for olsr
-
D. Raffo, C. Adjih, T. Clausen, and P. Muhlenthaler, "An Advanced Signature System for OLSR," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2004, pp. 10-16.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 10-16
-
-
Raffo, D.1
Adjih, C.2
Clausen, T.3
Muhlenthaler, P.4
-
32
-
-
84934300668
-
Computing cryptographic algorithms in portable and embedded devices
-
A. Ramachandran, Z. Zhou, and D. Huang, "Computing Cryptographic Algorithms in Portable and Embedded Devices," in Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE). IEEE, 2007, pp. 183-187.
-
(2007)
Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE). IEEE
, pp. 183-187
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
33
-
-
84855203308
-
Computational and energy costs of cryptographic algorithms on handheld devices
-
H. Rif'a-Pous and J. Herrera-Joancomart?, "Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices," Future Internet, vol. 3, no. 1, pp. 31-48, 2011.
-
(2011)
Future Internet
, vol.3
, Issue.1
, pp. 31-48
-
-
Rif'a-Pous, H.1
Herrera-Joancomart, J.2
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
37
-
-
33749048761
-
An effective intrusion detection approach for olsr manet protocol
-
M. Wang, L. Lamont, P. Mason, and M. Gorlatova, "An effective intrusion detection approach for OLSR MANET protocol," Proceedings of 1st IEEE ICNP Workshop on Secure Network Protocols, 2005.
-
(2005)
Proceedings of 1st IEEE ICNP Workshop on Secure Network Protocols
-
-
Wang, M.1
Lamont, L.2
Mason, P.3
Gorlatova, M.4
-
38
-
-
26844467743
-
On digital signatures in ad hoc networks
-
D. Westhoff, B. Lamparter, C. Paar, and A. Weimerskirch, "On Digital Signatures in Ad Hoc Networks," European Transactions on Telecommunications, vol. 16, no. 5, pp. 411-425, 2005.
-
(2005)
European Transactions on Telecommunications
, vol.16
, Issue.5
, pp. 411-425
-
-
Westhoff, D.1
Lamparter, B.2
Paar, C.3
Weimerskirch, A.4
|