-
1
-
-
79953899288
-
On the security of an enhanced UMTS authentication and key agreement protocol
-
DOI: 10.1002/ett.1460. http://dx. doi.org/10.1002/ett.1460
-
Hwang MS, Chong SK, Ou HH. On the security of an enhanced UMTS authentication and key agreement protocol. European Transactions on Telecommunications 2011; 22(3): 99-112. DOI: 10.1002/ett.1460. http://dx. doi.org/10.1002/ett.1460.
-
(2011)
European Transactions on Telecommunications
, vol.22
, Issue.3
, pp. 99-112
-
-
Hwang, M.S.1
Chong, S.K.2
Ou, H.H.3
-
2
-
-
77953155482
-
Trust management in wireless sensor networks
-
DOI: 10.1002/ett.1413. http://dx.doi.org/10. 1002/ett.1413
-
Zahariadis T, Leligou HC, Trakadas P, Voliotis S. Trust management in wireless sensor networks. European Transactions on Telecommunications 2010; 21(4): 386-395. DOI: 10.1002/ett.1413. http://dx.doi.org/10. 1002/ett.1413.
-
(2010)
European Transactions on Telecommunications
, vol.21
, Issue.4
, pp. 386-395
-
-
Zahariadis, T.1
Leligou, H.C.2
Trakadas, P.3
Voliotis, S.4
-
3
-
-
84872290581
-
Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols
-
DOI: 10.1002/ett.2514
-
Lv C, Li H, Ma J, Zhang Y. Vulnerability analysis of elliptic curve cryptography-based rfid authentication protocols. Transactions on Emerging Telecommunications Technologies 2012; 23: 618-624. DOI: 10.1002/ett.2514. http://dx.doi.org/10.1002/ett.2514.
-
(2012)
Transactions on Emerging Telecommunications Technologies
, vol.23
, pp. 618-624
-
-
Lv, C.1
Li, H.2
Ma, J.3
Zhang, Y.4
-
4
-
-
84863724608
-
Secure DVHop localization scheme against wormhole attacks in wireless sensor networks
-
DOI: 10.1002/ett.1532
-
Labraoui N, Gueroui M, Aliouat M. Secure DVHop localization scheme against wormhole attacks in wireless sensor networks. European Transactions on Telecommunications 2012; 23: 303-316. DOI: 10.1002/ett.1532. http://dx.doi.org/10.1002/ett.1532.
-
(2012)
European Transactions on Telecommunications
, vol.23
, pp. 303-316
-
-
Labraoui, N.1
Gueroui, M.2
Aliouat, M.3
-
5
-
-
84867316916
-
Combating channel eviction triggering denial-of-service attacks in cognitive radio networks
-
DOI: 10.1002/ett.2502. http://dx.doi.org/10. 1002/ett.2502
-
Sodagari S, Attar A, Leung VCM, Bilen SG. Combating channel eviction triggering denial-of-service attacks in cognitive radio networks. Transactions on Emerging Telecommunications Technologies 2012; 23: 454-465. DOI: 10.1002/ett.2502. http://dx.doi.org/10. 1002/ett.2502.
-
(2012)
Transactions on Emerging Telecommunications Technologies
, vol.23
, pp. 454-465
-
-
Sodagari, S.1
Attar, A.2
Vcm, L.3
Bilen, S.G.4
-
6
-
-
79959538975
-
Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): A comprehensive overview
-
DOI: 10.1002/ett.1466. http://dx.doi. org/10.1002/ett.1466
-
Ishmanov F, Malik AS, Kim SW. Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): a comprehensive overview. European Transactions on Telecommunications 2011; 22(4): 151-167. DOI: 10.1002/ett.1466. http://dx.doi. org/10.1002/ett.1466.
-
(2011)
European Transactions on Telecommunications
, vol.22
, Issue.4
, pp. 151-167
-
-
Ishmanov, F.1
Malik, A.S.2
Kim, S.W.3
-
7
-
-
80054758212
-
A combined approach for distinguishing different types of jamming attacks against wireless networks 2011
-
Computers and Signal Processing (PacRim), Victoria, Canada, August DOI: 10.1109/PACRIM.2011.6032998
-
Wang L, Wyglinski A. A combined approach for distinguishing different types of jamming attacks against wireless networks, In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim), Victoria, Canada, August 2011; 809-814, DOI: 10.1109/PACRIM.2011.6032998.
-
(2011)
IEEE Pacific Rim Conference on Communications
, pp. 809-814
-
-
Wang, L.1
Wyglinski, A.2
-
8
-
-
82155185165
-
Secure lossless aggregation over fading and shadowing channels for smart grid M2M networks
-
DOI: 10.1109/TSG.2011.2162431
-
Bartoli A, Hernandez-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D. Secure lossless aggregation over fading and shadowing channels for smart grid M2M networks. IEEE Transactions on Smart Grid 2011; 2(4): 844-864. DOI: 10.1109/TSG.2011.2162431.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 844-864
-
-
Bartoli, A.1
Hernandez-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
9
-
-
78751642052
-
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
-
DOI: 10.1016/j.comcom.2010.04.008. Special Issue of Computer Communications on Information and Future Communication Security
-
Baig ZA. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Computer Communications 2011; 34(3): 468-484. DOI: 10.1016/j.comcom.2010.04.008. Special Issue of Computer Communications on Information and Future Communication Security.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 468-484
-
-
Baig, Z.A.1
-
10
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
DOI: 10.1109/COMST.2006.315852
-
Wang Y, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks. IEEE Communications Surveys Tutorials 2006; 8(2): 2-23. DOI: 10.1109/COMST.2006.315852.
-
(2006)
IEEE Communications Surveys Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
11
-
-
70349308780
-
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
-
Aldini A, Barthe G, Gorrieri R (eds), Lecture Notes in Computer Science Springer: Berlin/Heidelberg
-
Lopez J, Roman R, Alcaraz C. Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of Security Analysis and Design V, Vol. 5705, Aldini A, Barthe G, Gorrieri R (eds), Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, 2009; 289-338.
-
(2009)
Foundations of Security Analysis and Design v
, vol.5705
, pp. 289-338
-
-
Lopez, J.1
Roman, R.2
Alcaraz, C.3
-
12
-
-
77953998449
-
-
Towards ieee 802.15.4e: A study of performance aspects DOI: 10.1109/PERCOMW. 2010.5470605
-
Chen F, German R, Dressler F. Towards ieee 802.15.4e: A study of performance aspects, In 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Mannheim, Germany, 2010; 68-73, DOI: 10.1109/PERCOMW. 2010.5470605.
-
(2010)
2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Mannheim, Germany
, pp. 68-73
-
-
Chen, F.1
German, R.2
Dressler, F.3
-
13
-
-
77951607839
-
An efficient post-deployment key establishment scheme for heterogeneous sensor networks
-
GLOBECOM 2009 IEEE, Hawaii, USA DOI: 10.1109/GLOCOM.2009.5425551
-
Loree P, Nygard K, Du X. An efficient post-deployment key establishment scheme for heterogeneous sensor networks, In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, Hawaii, USA, 2009; 1-6, DOI: 10.1109/GLOCOM.2009.5425551.
-
(2009)
Global Telecommunications Conference
, vol.2009
, pp. 1-6
-
-
Loree, P.1
Nygard, K.2
Du, X.3
-
14
-
-
84866377144
-
Pairwise post deployment key management scheme for heterogeneous sensor networks
-
Mobile and Multimedia Networks (WoWMoM), San Francisco, USA DOI: 10.1109/WoWMoM.2012.6263741
-
Gagneja K. Pairwise post deployment key management scheme for heterogeneous sensor networks, In 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, USA, 2012; 1-2, DOI: 10.1109/WoWMoM.2012.6263741.
-
(2012)
2012 IEEE International Symposium on A World of Wireless
, pp. 1-2
-
-
Gagneja, K.1
|