-
1
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: Spins: security protocols for sensor networks. In: Proceedings of ACM Mobile Computing and Networking (Mobicom 2001), pp. 189-199 (2001) (Pubitemid 33006715)
-
(2001)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
3
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communcations Security, pp. 52-61 (2003) (Pubitemid 40673788)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
4
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: 10th ACM conference on Computer and Communications Security, pp. 62-72 (2003) (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
6
-
-
1642603917
-
Secure routing for large-scale wireless sensor networks
-
Yin, C., Huang, S., Su, P., Gao, C.: Secure routing for large-scale wireless sensor networks. Communication Technology Proceedings 2, 1282-1286 (2003)
-
(2003)
Communication Technology Proceedings
, vol.2
, pp. 1282-1286
-
-
Yin, C.1
Huang, S.2
Su, P.3
Gao, C.4
-
7
-
-
32444446043
-
Wireless sensor networks for intrusion detection: Packet traffic modeling
-
DOI 10.1109/LCOMM.2006.1576557
-
Demirkol, I., Alagoz, F., Delic, H., Ersoy, C.: Wireless Sensor Networks for Intrusion Detection: Packet Traffic Modeling. IEEE Communications Letters 10(1), 22-24 (2006) (Pubitemid 43224855)
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.1
, pp. 22-24
-
-
Demirkol, I.1
Alagoz, F.2
Delic, H.3
Ersoy, C.4
-
8
-
-
84885893865
-
Simple evasive data storage in sensor networks
-
Benson, Z., Freiling, F., Cholewinski, P.: Simple Evasive Data Storage in Sensor Networks. In: 17th IASTED International Conference on Parallel and Distributed Computing and Systems: First International Workshop on Distributed Algorithms and Applications for Wireless and Mobile Systems, pp. 779-784 (2005)
-
(2005)
17th IASTED International Conference on Parallel and Distributed Computing and Systems: First International Workshop on Distributed Algorithms and Applications for Wireless and Mobile Systems
, pp. 779-784
-
-
Benson, Z.1
Freiling, F.2
Cholewinski, P.3
-
10
-
-
0020832735
-
Exponentiation modulo a polynomial for data security
-
Kak, S.: Exponentiation modulo a polynomial for data security. International Journal of Computer and Information Science 13, 337-346 (1983) (Pubitemid 14529608)
-
(1983)
International journal of computer & information sciences
, vol.12
, Issue.5
, pp. 337-346
-
-
Kak, S.C.1
-
11
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communication of ACM 22(11), 612-613 (1979)
-
(1979)
Communication of ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
15844428724
-
DIPS: A distributed index for features in sensor networks
-
DOI 10.1016/S1570-8705(03)00010-6
-
Greenstein, B., Estrin, D., Govindan, R., Ratnasamy, S., Shenker, S.: DIFS: A Distributed Index for Features in Sensor Networks. Ad Hoc Networks 1, 333-349 (2003) (Pubitemid 40421417)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 333-349
-
-
Greenstein, B.1
Ratnasamy, S.2
Shenker, S.3
Govindan, R.4
Estrin, D.5
-
16
-
-
35648972648
-
Securing distributed data storage and retrieval in sensor networks
-
DOI 10.1016/j.pmcj.2007.06.002, PII S1574119207000454, PerCom 2007
-
Subramanian, N., Yang, C., Zhang, W.: Securing distributed data storage and retrieval in sensor networks. Pervasive and Mobile Computing 3(6), 659-676 (2007) (Pubitemid 350030640)
-
(2007)
Pervasive and Mobile Computing
, vol.3
, Issue.6
, pp. 659-676
-
-
Subramanian, N.1
Yang, C.2
Zhang, W.3
-
17
-
-
3142751481
-
On supporting distributed collaboration in sensor networks
-
Wang, G., Zhang, W., Cao, G., La Porta, T.: On supporting distributed collaboration in sensor networks. In: IEEE Military Communications Conference, vol. 2, pp. 752-757 (2003)
-
(2003)
IEEE Military Communications Conference
, vol.2
, pp. 752-757
-
-
Wang, G.1
Zhang, W.2
Cao, G.3
La Porta, T.4
-
18
-
-
0036949025
-
A two-tier data dissemination model for large-scale wireless sensor networks
-
Ye, F., Luo, H., Cheng, J., Lu, S., Zhang, L.: A two-tier data dissemination model for large-scale wireless sensor networks. In: ACM International Conference on Mobile Computing and Networking, pp. 148-159 (2002)
-
(2002)
ACM International Conference on Mobile Computing and Networking
, pp. 148-159
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
19
-
-
84943517831
-
Data dissemination with ring-based index for sensor networks
-
Zhang, W., Cao, G., La Porta, T.: Data dissemination with ring-based index for sensor networks. In: IEEE International Conference on Network Protocol, pp. 305-314 (2003)
-
(2003)
IEEE International Conference on Network Protocol
, pp. 305-314
-
-
Zhang, W.1
Cao, G.2
La Porta, T.3
-
20
-
-
84947905037
-
A nonlinear secret sharing scheme
-
Information Security and Privacy
-
Renvall, A., Ding, C.: A nonlinear secret sharing scheme. In: Pieprzyk, J.P., Se-berry, J. (eds.) ACISP 1996. LNCS, vol. 1172, pp. 56-66. Springer, Heidelberg (1996) (Pubitemid 126155209)
-
(1996)
Lecture Notes in Computer Science
, Issue.1172
, pp. 56-66
-
-
Renvall, A.1
Ding, C.2
|