-
1
-
-
84886058588
-
-
Fatality analysis reporting system (FARS) web-based encyclopedia. http://www-fars.nhtsa.dot.gov/.
-
-
-
-
2
-
-
0031248512
-
A new location technique for the active office
-
October
-
A. Ward, A. Jones, and A. Hopper. A new location technique for the active office. IEEE Personal Communications Magazine, 4(5):42-47, October 1997.
-
(1997)
IEEE Personal Communications Magazine
, vol.4
, Issue.5
, pp. 42-47
-
-
Ward, A.1
Jones, A.2
Hopper, A.3
-
3
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
P. Bahl and V. N. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In IEEE Infocom 2000, Volume 2, pages 775-784, 2000.
-
(2000)
IEEE Infocom 2000
, vol.2
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.N.2
-
4
-
-
84976295016
-
Distance-bounding protocols
-
S. Brands and D. Chaum. Distance-bounding protocols. In EUROCRYPT '93, pages 344-359, 1994.
-
(1994)
EUROCRYPT '93
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
0034291601
-
GPS-less low cost outdoor localization for very small devices
-
October
-
N. Bulusu, J. Heidemann, and D. Estrin. GPS-less low cost outdoor localization for very small devices. IEEE Personal Communications Magazine, 7(5):28-34, October 2000.
-
(2000)
IEEE Personal Communications Magazine
, vol.7
, Issue.5
, pp. 28-34
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
6
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In IEEE INFOCOM, 2005.
-
(2005)
IEEE INFOCOM
-
-
Capkun, S.1
Hubaux, J.-P.2
-
7
-
-
84945536849
-
A probabilistic room location service for wireless networked environments
-
P. Castro, P. Chiu, T. Kremenek, and R. R. Muntz. A probabilistic room location service for wireless networked environments. In UbiComp '01, pages 18-34, 2001.
-
(2001)
UbiComp '01
, pp. 18-34
-
-
Castro, P.1
Chiu, P.2
Kremenek, T.3
Muntz, R.R.4
-
10
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. In MobiCom '02, pages 12-23, 2002.
-
(2002)
MobiCom '02
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
3042594839
-
The security and privacy of smart vehicles
-
J.-P. Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security and Privacy, 2(3):49-55, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Luo, J.3
-
12
-
-
84931321948
-
Design of a system solution for relative positioning of vehicles using vehicle-to-vehicle radio communications during gps outages
-
2:1313-1317, October
-
Kukshya, V.; Krishnan, H.; Kellum, C. Design of a system solution for relative positioning of vehicles using vehicle-to-vehicle radio communications during gps outages. Vehicular Technology Conference 2005, 2:1313-1317, October 2005.
-
(2005)
Vehicular Technology Conference 2005
-
-
Kukshya, V.1
Krishnan, H.2
Kellum, C.3
-
13
-
-
84866469313
-
SeRLoc: Robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran. SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73-100, 2005.
-
(2005)
ACM Trans. Sen. Netw.
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
-
14
-
-
33144467903
-
Attack-resistant location estimation in wireless sensor networks
-
Los Angeles, California, USA
-
D. Liu, P. Ning, and W. Du. Attack-resistant location estimation in wireless sensor networks. In IPSN '05, pages 99-106, Los Angeles, California, USA, 2005.
-
(2005)
IPSN '05
, pp. 99-106
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In MobiCom '00, pages 255-265, 2000.
-
(2000)
MobiCom '00
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
33847179697
-
The sybil attack in sensor networks: Analysis and defenses
-
Apr.
-
J. Newsome, R. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defenses. In IPSN '04), Apr. 2004.
-
(2004)
IPSN '04)
-
-
Newsome, J.1
Shi, R.2
Song, D.3
Perrig, A.4
-
17
-
-
3142585395
-
A secure and private system for subscription-based remote services
-
P. Persiano and I. Visconti. A secure and private system for subscription-based remote services. ACM Trans. Inf. Syst. Secur., 6(4):472-500, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.4
, pp. 472-500
-
-
Persiano, P.1
Visconti, I.2
-
19
-
-
84885978004
-
-
Qualnet Network Simulator. http://www.qualnet.com/.
-
-
-
-
20
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 26(1):96-99, 1983.
-
(1983)
Commun. ACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
1542317849
-
Secure verification of location claims
-
New York, NY, USA
-
N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In WiSe '03, pages 1-10, New York, NY, USA, 2003.
-
(2003)
WiSe '03
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
22
-
-
0242612017
-
Localization from mere connectivity
-
Y. Shang, W. Ruml, Y. Zhang, and M. P. J. Fromherz. Localization from mere connectivity. In MobiHoc '03, pages 201-212, 2003.
-
(2003)
MobiHoc '03
, pp. 201-212
-
-
Shang, Y.1
Ruml, W.2
Zhang, Y.3
Fromherz, M.P.J.4
-
24
-
-
33751533670
-
A defense against wormhole attacks in wireless ad hoc networks
-
San Francisco, CA, USA
-
Y. Hu, A. Perrig, and D. Johnson. A defense against wormhole attacks in wireless ad hoc networks. In Proc. of INFOCOM 2003, San Francisco, CA, USA, 2003.
-
(2003)
Proc. of INFOCOM 2003
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
|