-
1
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. ACM Commun 47(6), 53-57 (2004)
-
(2004)
ACM Commun
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
2
-
-
55749099619
-
On handling insider attacks in wireless sensor networks
-
Krauß, C., Schneider, M., Eckert, C.: On handling insider attacks in wireless sensor networks. Inf. Secur. Tech. Rep. 13(3), 165-172 (2008)
-
(2008)
Inf. Secur. Tech. Rep.
, vol.13
, Issue.3
, pp. 165-172
-
-
Krauß, C.1
Schneider, M.2
Eckert, C.3
-
3
-
-
33847326821
-
DICAS: Detection, diagnosis and isolation of control attacks in sensor networks
-
Khalil, I., Bagchi, S., Nina-Rotaru, C.: DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. In: 1st Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM (2005)
-
(2005)
1st Int. Conf. on Security and Privacy for Emerging Areas in Communications Networks, SECURECOMM
-
-
Khalil, I.1
Bagchi, S.2
Nina-Rotaru, C.3
-
4
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
-
ACM, New York
-
Conti, M., Pietro, R.D., Mancini, L.V., Mei, A.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: WiSec 2008: 1st conference on Wireless network security, pp. 214-219. ACM, New York (2008)
-
(2008)
WiSec 2008: 1st Conference on Wireless Network Security
, pp. 214-219
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Mei, A.4
-
5
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
Seshadri, A., Perrig, A., Van Doorn, L., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: Proceedings of the IEEE Symposium on Security and Privacy (2004)
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
6
-
-
38149142765
-
Detecting node compromise in hybrid WSN using attestation techniques
-
Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007, Springer, Heidelberg
-
Krauß, C., Stumpf, F., Eckert, C.M.: Detecting node compromise in hybrid WSN using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203-217. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4572
, pp. 203-217
-
-
Krauß, C.1
Stumpf, F.2
Eckert, C.M.3
-
7
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51(5), 541-552 (2002) (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
8
-
-
27244449350
-
EM analysis of Rijndael and ECC on a wireless Java-based PDA
-
Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
-
Gebotys, C.H., Ho, S., Tiu, C.C.: EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 250-264. Springer, Heidelberg (2005) (Pubitemid 41520710)
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 250-264
-
-
Gebotys, C.H.1
Ho, S.2
Tiu, C.C.3
-
9
-
-
38049074796
-
Power and em attacks on passive 13.56 MHz RFID devices
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007, Springer, Heidelberg
-
Hutter, M., Mangard, S., Feldhofer, M.: Power and EM attacks on passive 13.56 MHz RFID devices. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 320-333. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 320-333
-
-
Hutter, M.1
Mangard, S.2
Feldhofer, M.3
-
12
-
-
84871015447
-
-
Portfolio
-
CrossBow. Wireless Sensor Networks Module Portfolio, http://www.xbow.com/ Products/productdetails.aspx?sid=156
-
Wireless Sensor Networks Module
-
-
-
13
-
-
33745639957
-
-
Technical Report CU-CS-990-05, Colorado University
-
Hartung, C., Balasalle, J., Han, R.: Node compromise in WSN: The need for secure systems. Technical Report CU-CS-990-05, Colorado University (2005)
-
(2005)
Node Compromise in WSN: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
14
-
-
33745855808
-
Tampering with motes: Real-world physical attacks on wireless sensor networks
-
DOI 10.1007/11734666-9, Security in Pervasive Computing - Third International Conference, SPC 2006, Proceedings
-
Becher, E., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104-118. Springer, Heidelberg (2006) (Pubitemid 44029561)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3934
, pp. 104-118
-
-
Becher, A.1
Benenson, Z.2
Dornseif, M.3
-
18
-
-
33745754379
-
Side channel attacks on message authentication codes
-
DOI 10.1007/11601494-17, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers
-
Okeya, K., Iwata, T.: Side channel attacks on message authentication codes. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 205- 217. Springer, Heidelberg (2005) (Pubitemid 44012985)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3813
, pp. 205-217
-
-
Okeya, K.1
Iwata, T.2
-
19
-
-
58449135149
-
Securing sensor nodes against side channel attacks
-
Pongaliur, K., Abraham, Z., Liu, A.X., Xiao, L., Kempel, L.: Securing sensor nodes against side channel attacks. In: HASE: Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, pp. 353-361 (2008)
-
(2008)
HASE: Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium
, pp. 353-361
-
-
Pongaliur, K.1
Abraham, Z.2
Liu, A.X.3
Xiao, L.4
Kempel, L.5
-
20
-
-
67049146380
-
Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices
-
Lee, P.J., Cheon, J.H. (eds.), ICISC 2008, Springer, Heidelberg
-
Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. Comparison Side- Channel Distinguishers:an Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 253-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5461
, pp. 253-267
-
-
Standaert, F.-X.1
Gierlichs, B.2
Verbauwhede, I.3
-
23
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Joye, M., Quisquater, J.-J. (eds.), CHES 2004, Springer, Heidelberg
-
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16-29. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
24
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
Washington, DC, USA. IEEE Computer Society, Los Alamitos
-
de Meulenaer, G., Gosset, F., Standaert, F.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: WIMOB 2008: Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, Washington, DC, USA, pp. 580-585. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
WIMOB 2008: Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
25
-
-
70350645332
-
Template attacks on ECDSA
-
Chung, K.-I., Sohn, K., Yung, M. (eds.), WISA 2008, Springer, Heidelberg
-
Medwed, M., Oswald, E.: Template attacks on ECDSA. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 14-27. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5379
, pp. 14-27
-
-
Medwed, M.1
Oswald, E.2
-
26
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
April
-
Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN, pp. 245-256 (April 2008)
-
(2008)
IPSN
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
28
-
-
70350585044
-
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
-
Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.), Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Springer, Heidelberg
-
Lederer, C., Mader, R., Koschuch, M., Großschdl, J., Szekely, A., Tillich, S.: Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. LNCS, vol. 5746, pp. 112-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5746
, pp. 112-127
-
-
Lederer, C.1
Mader, R.2
Koschuch, M.3
Großschdl, J.4
Szekely, A.5
Tillich, S.6
-
29
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: SP 2005: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 49-63 (2005) (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
30
-
-
78650238574
-
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
-
Smart Card Programming and Security
-
Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200-210. Springer, Heidelberg (2001) (Pubitemid 33340056)
-
(2001)
Lecture Notes in Computer Science
, Issue.2140
, pp. 200-210
-
-
Quisquater, J.-J.1
Samyde, D.2
|