-
1
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103-105 (2003)
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
2
-
-
51349148059
-
SET: Detecting node clones in sensor networks
-
Choi, H., Zhu, S., La Porta, T.F.: SET: Detecting node clones in sensor networks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 341-350 (2007)
-
(2007)
Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007)
, pp. 341-350
-
-
Choi, H.1
Zhu, S.2
La Porta, T.F.3
-
3
-
-
36249025569
-
On the detection of clones in sensor networks using random key predistribution
-
DOI 10.1109/TSMCC.2007.905824
-
Brooks, R., Govindaraju, P.Y., Pirretti, M., Vijaykrishnan, N., Kandemir, M.T.: On the Detection of Clones in Sensor Networks Using Random Key Predistribution. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 37(6), 1246-1258 (2007) (Pubitemid 350130716)
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.37
, Issue.6
, pp. 1246-1258
-
-
Brooks, R.1
Govindaraju, P.Y.2
Pirretti, M.3
Vijaykrishnan, N.4
Kandemir, M.T.5
-
4
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, Washington, DC, USA, pp. 41-47 (2002)
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
5
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 49-63 (2005) (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
6
-
-
0036983290
-
GHT: A geographic hash table for data-centric storage
-
Atlanta, Georgia, USA. ACM, New York
-
Ratnasamy, S., Karp, B., Yin, L., Yu, F., Estrin, D., Govindan, R., Shenker, S.: GHT: a geographic hash table for data-centric storage. In: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications (WSNS), Atlanta, Georgia, USA. ACM, New York (2002)
-
(2002)
Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNS)
-
-
Ratnasamy, S.1
Karp, B.2
Yin, L.3
Yu, F.4
Estrin, D.5
Govindan, R.6
Shenker, S.7
-
7
-
-
48649109631
-
Efficient distributed detection of node replication attacks in sensor networks
-
Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., Roy, S.: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC), pp. 257-267 (2007)
-
(2007)
Twenty-Third Annual Computer Security Applications Conference (ACSAC)
, pp. 257-267
-
-
Zhu, B.1
Addada, V.G.K.2
Setia, S.3
Jajodia, S.4
Roy, S.5
-
8
-
-
37849004592
-
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
-
Montreal, Quebec, Canada. ACM, New York
-
Conti, M., Pietro, R.D., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, Montreal, Quebec, Canada. ACM, New York (2007)
-
(2007)
Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
9
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102-114 (2002)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
10
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Verdone, R. (ed.) EWSN 2008, Springer, Heidelberg
-
Szczechowiak, P., Oliveira, L., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
13
-
-
53149126145
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
Oliveira, L.B., Scott, M., Lopez, J., Dahab, R.: TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: 5th International Conference on Networked Sensing Systems, INSS, pp. 173-180 (2008)
-
(2008)
5th International Conference on Networked Sensing Systems, INSS
, pp. 173-180
-
-
Oliveira, L.B.1
Scott, M.2
Lopez, J.3
Dahab, R.4
-
14
-
-
63149181200
-
-
Springer, Heidelberg
-
Poovendran, R., Wang, C., Roy, S.: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Springer, Heidelberg (2007)
-
(2007)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
-
-
Poovendran, R.1
Wang, C.2
Roy, S.3
-
15
-
-
33746322177
-
Local leader election, signal strength aware flooding, and routeless routing
-
Chen, G., Branch, J.W., SzymanskiChen, B.K.: Local leader election, signal strength aware flooding, and routeless routing. In: Proceedings of 19th IEEE International of Parallel and Distributed Processing Symposium, IPDPS 2005 (2005)
-
(2005)
Proceedings of 19th IEEE International of Parallel and Distributed Processing Symposium, IPDPS 2005
-
-
Chen, G.1
Branch, J.W.2
Szymanskichen, B.K.3
-
16
-
-
0034775826
-
A scalable contentaddressable network
-
San Diego, California United States, ACM, New York
-
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable contentaddressable network. In: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, San Diego, California, United States. ACM, New York (2001)
-
(2001)
Proceedings of the 2001 Conference on Applications Technologies Architectures and Protocols for Computer Communications
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Schenker, S.5
-
17
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking (TON) 11(1), 17-32 (2003)
-
(2003)
IEEE/ACM Transactions on Networking (TON)
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
18
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
Guerraoui, R. (ed.) Middleware 2001, Springer, Heidelberg
-
Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2218
, pp. 329
-
-
Rowstron, A.I.T.1
Druschel, P.2
-
21
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications 30(21-12), 2314-2341 (2007) (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
23
-
-
33750334527
-
Virtual ring routing: Network routing inspired by DHTs
-
Pisa Italy, ACM, New York
-
Caesar, M., Castro, M., Nightingale, E.B., O'Shea, G., Rowstron, A.: Virtual ring routing: network routing inspired by DHTs. In: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2006), Pisa, Italy. ACM, New York (2006)
-
(2006)
Proceedings of the 2006 Conference on Applications Technologies Architectures and Protocols for Computer Communications (SIGCOMM 2006)
-
-
Caesar, M.1
Castro, M.2
Nightingale, E.B.3
O'shea, G.4
Rowstron, A.5
-
24
-
-
64849083109
-
Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks
-
Awad, A., Sommer, C., German, R., Dressler, F.: Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008), pp. 133-142 (2008)
-
(2008)
5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008)
, pp. 133-142
-
-
Awad, A.1
Sommer, C.2
German, R.3
Dressler, F.4
|