-
1
-
-
34547484870
-
The tenet architecture for tiered sensor networks
-
Colorado, USA, Oct.
-
O. Gnawali, K.-Y. Jang, J. Paek, M. Vieira, R. Govindan, B. Greenstein, A. Joki, D. Estrin, E. Kohler, The tenet architecture for tiered sensor networks, in: ACM SenSys'06, Boulder, Colorado, USA, Oct. 2006, pp. 153-166.
-
(2006)
ACM SenSys'06, Boulder
, pp. 153-166
-
-
Gnawali, O.1
Jang, K.-Y.2
Paek, J.3
Vieira, M.4
Govindan, R.5
Greenstein, B.6
Joki, A.7
Estrin, D.8
Kohler, E.9
-
2
-
-
0042564491
-
Data-centric storage in sensor nets with GHT, a geographic hash table
-
S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu Data-centric storage in sensor nets with GHT, a geographic hash table Mob. Netw. Appl. 8 4 2003
-
(2003)
Mob. Netw. Appl.
, vol.8
, Issue.4
-
-
Ratnasamy, S.1
Karp, B.2
Shenker, S.3
Estrin, D.4
Govindan, R.5
Yin, L.6
Yu, F.7
-
3
-
-
51249105495
-
Rethinking data management for storage-centric sensor networks
-
Asilomar, CA, USA, Jan.
-
Y. Diao, D. Ganesan, G. Mathur, P.J. Shenoy, Rethinking data management for storage-centric sensor networks, in: Third Biennial Conference on Innovative Data Systems Research (CIDR'07), Asilomar, CA, USA, Jan. 2007, pp. 22-31.
-
(2007)
Third Biennial Conference on Innovative Data Systems Research (CIDR'07)
, pp. 22-31
-
-
Diao, Y.1
Ganesan, D.2
Mathur, G.3
Shenoy, P.J.4
-
4
-
-
51349098378
-
Verifiable privacy-preserving range query in two-tiered sensor networks
-
B. Sheng, Q. Li, Verifiable privacy-preserving range query in two-tiered sensor networks, in: Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Sheng, B.1
Li, Q.2
-
6
-
-
77953310348
-
SafeQ: Secure and efficient query processing in sensor networks
-
F. Chen, Alex X. Liu, SafeQ: secure and efficient query processing in sensor networks, in: Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Chen, F.1
Liu, A.X.2
-
7
-
-
78651506283
-
A spatiotemporal approach for secure range queries in tiered sensor networks
-
J. Shi, R. Zhang, and Y. Zhang A spatiotemporal approach for secure range queries in tiered sensor networks IEEE Trans. Wireless Commun. 10 1 2011 264 273
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.1
, pp. 264-273
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
8
-
-
77953304573
-
Verifiable fine-grained top-k queries in tiered sensor networks
-
R. Zhang, Ji. Shi, Y. Liu, Y. Zhang, Verifiable fine-grained top-k queries in tiered sensor networks, in: Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Zhang, R.1
Shi, Ji.2
Liu, Y.3
Zhang, Y.4
-
9
-
-
48349089344
-
Design and implementation of cross-domain cooperative firewall
-
J. Cheng, H. Yang, S.H. Wong, S. Lu, Design and implementation of cross-domain cooperative firewall, in: Proc. IEEE ICNP, 2007.
-
(2007)
Proc. IEEE ICNP
-
-
Cheng, J.1
Yang, H.2
Wong, S.H.3
Lu, S.4
-
10
-
-
57549111039
-
Collaborative enforcement of firewall policies in virtual private networks
-
Toronto, Canada, August
-
A.X. Liu, F. Chen, Collaborative enforcement of firewall policies in virtual private networks, in: Proc. Annual ACM SIGACT-SIGOPS PODC, Toronto, Canada, August 2008.
-
(2008)
Proc. Annual ACM SIGACT-SIGOPS PODC
-
-
Liu, A.X.1
Chen, F.2
-
11
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
H. Hacigumus, B.R. Iyer, C. Li, S. Mehrotra, Executing SQL over encrypted data in the database service provider model, in: Proc. ACM SIGMOD, 2002, pp. 216-227.
-
(2002)
Proc. ACM SIGMOD
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
12
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, G. Tsudik, A privacy-preserving index for range queries, in: Proc. 30th VLDB, 2004, pp. 720-731.
-
(2004)
Proc. 30th VLDB
, pp. 720-731
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
13
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
W. He, X. Liu, H. Nguyen, K. Nahrstedt, T. Abdelzaher, PDA: Privacy-preserving data aggregation in wireless sensor networks, in: Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
14
-
-
77949793520
-
Confidentiality protection schemes for data aggregation in sensor networks
-
T. Feng, C. Wang, W. Zhang, L. Ruan, Confidentiality protection schemes for data aggregation in sensor networks, in: Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Feng, T.1
Wang, C.2
Zhang, W.3
Ruan, L.4
-
15
-
-
49449109253
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Y. Yang, X. Wang, S. Zhu, and G. Cao SDAP: a secure hop-by-hop data aggregation protocol for sensor networks ACM Trans. Inf. Syst. Secur. 11 2008 18:1 18:43
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, pp. 181-1843
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
16
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
San Diego, CA, USA, 17-21 July
-
C. Castelluccia, E. Mykletun, G. Tsudik, Efficient aggregation of encrypted data in wireless sensor networks, in: Proceedings of MobiQuitous 05, San Diego, CA, USA, 17-21 July, pp. 109-117.
-
Proceedings of MobiQuitous 05
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
17
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
D. Westhoff, J. Girao, and M. Acharya Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation IEEE Trans. Mob. Comput. 5 10 2006 1417 1431
-
(2006)
IEEE Trans. Mob. Comput.
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
18
-
-
79953026475
-
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
-
H. Yu Secure and highly-available aggregation queries in large-scale sensor networks via set sampling Distrib. Comput. 23 2011 373 394
-
(2011)
Distrib. Comput.
, vol.23
, pp. 373-394
-
-
Yu, H.1
-
19
-
-
65849441512
-
Security model and framework for information aggregation in sensor networks
-
M. Manulis, and J. Schwenk Security model and framework for information aggregation in sensor networks ACM Tran. Sens. Netw. (TOSN) 5 2 2009
-
(2009)
ACM Tran. Sens. Netw. (TOSN)
, vol.5
, Issue.2
-
-
Manulis, M.1
Schwenk, J.2
-
20
-
-
14344259184
-
Feedback control of data aggregation in sensor networks
-
December 2004
-
T. Abdelzaher, T. He, J. Stankovic, Feedback control of data aggregation in sensor networks, in: Proc. IEEE CDC 2005, vol. 2, December 2004, pp. 1490-1495.
-
(2005)
Proc. IEEE CDC
, vol.2
, pp. 1490-1495
-
-
Abdelzaher, T.1
He, T.2
Stankovic, J.3
-
21
-
-
33744923423
-
Robust computation of aggregates in wireless sensor networks: Distributed randomized algorithms and analysis
-
J.-Y. Chen, G. Pandurangan, D. Xu, Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis, in: Proc. IPSN 2005.
-
(2005)
Proc. IPSN
-
-
Chen, J.-Y.1
Pandurangan, G.2
Xu, D.3
-
22
-
-
39049125046
-
Extending network lifetime for precision constrained data aggregation in wireless sensor networks
-
X. Tang, J. Xu, Extending network lifetime for precision constrained data aggregation in wireless sensor networks, in: Proc. IEEE INFOCOM 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Tang, X.1
Xu, J.2
-
23
-
-
35348912495
-
Underground structure monitoring with wireless sensor networks
-
M. Li, Y. Liu, Underground structure monitoring with wireless sensor networks, in: Proc. IPSN 2007.
-
(2007)
Proc. IPSN
-
-
Li, M.1
Liu, Y.2
-
24
-
-
79960854358
-
KIPDA: K-Indistinguishable privacy-preserving data aggregation in wireless sensor networks
-
Michael M. Groat, Wenbo Hey, Stephanie Forrest, KIPDA: k-Indistinguishable privacy-preserving data aggregation in wireless sensor networks, in: Proc. IEEE INFOCOM, 2011.
-
(2011)
Proc. IEEE INFOCOM
-
-
Groat, M.M.1
Hey, W.2
Forrest, S.3
-
26
-
-
0035278163
-
Algorithms for packet classification
-
P. Gupta, and N. McKeown Algorithms for packet classification IEEE Netw. 15 2 2001 24 32
-
(2001)
IEEE Netw.
, vol.15
, Issue.2
, pp. 24-32
-
-
Gupta, P.1
McKeown, N.2
-
27
-
-
33751232321
-
Fast binary and multiway prefix searches for packet forwarding
-
Y.-K. Chang Fast binary and multiway prefix searches for packet forwarding Comput. Netw. 51 3 2007 588 605
-
(2007)
Comput. Netw.
, vol.51
, Issue.3
, pp. 588-605
-
-
Chang, Y.-K.1
-
28
-
-
84870655865
-
-
Intel lab data http://berkeley.intel-research.net/labdata
-
Intel Lab Data
-
-
|