-
2
-
-
67650844989
-
Sensor network security: A survey
-
Second Quarter
-
X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: A survey," IEEE Commun. Surveys Tuts., vol. 11, no. 2, pp. 52-73, Second Quarter 2009.
-
(2009)
IEEE Commun. Surveys Tuts.
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. J. vol. 28, pp. 656-715 Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
5
-
-
0027629488
-
Common randomness in information theory and cryptography-part I: Secret sharing
-
July
-
R. Ahlswede and I. Csisz̀ar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csisz̀ar, I.2
-
6
-
-
80051720839
-
LDPC codes for the gaussian wiretap channel
-
Sept
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun, vol. 7. no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
9
-
-
84875140327
-
Channel aware encryption and decision fusion for wireless sensor networks
-
Apr
-
H. Jeon, J. Choi, S. McLaughlin, and J. Ha, "Channel aware encryption and decision fusion for wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol.8, no.4, pp. 619-625, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 619-625
-
-
Jeon, H.1
Choi, J.2
McLaughlin, S.3
Ha, J.4
-
10
-
-
80051774471
-
Secure type-based multiple access
-
Sept
-
H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, "Secure type-based multiple access," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 763-774, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 763-774
-
-
Jeon, H.1
Hwang, D.2
Choi, J.3
Lee, H.4
Ha, J.5
-
12
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Second Quarter
-
Y. Wang, G. Attebury, B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2-23, Second Quarter 2009.
-
(2009)
IEEE Commun. Surveys Tuts.
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
13
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
May
-
S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Processing, vol.57, no.5, pp.1976-1986, May 2009.
-
(2009)
IEEE Trans. Signal Processing
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.K.3
-
14
-
-
44049101044
-
Sensor data cryptography in wireless sensor networks
-
June
-
T. C. Aysal, K. E. Barner, "Sensor Data Cryptography in Wireless Sensor Networks," IEEE Trans. Inf. Forensics Security, vol.3, no.2, pp.273-289, June 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 273-289
-
-
Aysal, T.C.1
Barner, K.E.2
-
15
-
-
85032750878
-
Channel-aware distributed detection in wireless sensor networks
-
July
-
B. Chen, L. Tong, and P. K. Varshney, "Channel-aware distributed detection in wireless sensor networks," IEEE Signal Process. Mag., vol. 23, no. 4, pp. 16-26, July 2006.
-
(2006)
IEEE Signal Process. Mag.
, vol.23
, Issue.4
, pp. 16-26
-
-
Chen, B.1
Tong, L.2
Varshney, P.K.3
-
16
-
-
33244488501
-
Fusion of decisions transmitted over rayleigh fading channels in wireless sensor networks
-
Mar
-
R. Niu, B. Chen, and P. K. Varshney, "Fusion of decisions transmitted over Rayleigh fading channels in wireless sensor networks," IEEE Trans. Signal Process., vol. 54, no. 3, pp. 1018-1027, Mar. 2006.
-
(2006)
IEEE Trans. Signal Process.
, vol.54
, Issue.3
, pp. 1018-1027
-
-
Niu, R.1
Chen, B.2
Varshney, P.K.3
-
18
-
-
33947396105
-
Asymptotic detection performance of type-based multiple access over multiaccess fading channels
-
Mar
-
G. Mergen, V. Naware, and L. Tong, "Asymptotic detection performance of type-based multiple access over multiaccess fading channels," IEEE Trans. Signal Process., vol. 55, no. 3, pp. 1081-1092, Mar. 2007.
-
(2007)
IEEE Trans. Signal Process.
, vol.55
, Issue.3
, pp. 1081-1092
-
-
Mergen, G.1
Naware, V.2
Tong, L.3
-
19
-
-
34247844334
-
Type-based decentralized detection in wireless sensor networks
-
May
-
K. Liu and A. M. Sayeed, "Type-based decentralized detection in wireless sensor networks," IEEE Trans. Signal Process., vol. 55, no. 5, pp. 1899-1910, May 2007.
-
(2007)
IEEE Trans. Signal Process.
, vol.55
, Issue.5
, pp. 1899-1910
-
-
Liu, K.1
Sayeed, A.M.2
-
20
-
-
69349090058
-
PAC vs. MAC for decentralized detection using noncoherent modulation
-
Sept
-
C. R. Berger, M. Guerriero, S. Zhou, and P. Willett, "PAC vs. MAC for decentralized detection using noncoherent modulation," IEEE Trans. Signal Process., vol. 57, no. 9, pp. 3562-3575, Sept. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.9
, pp. 3562-3575
-
-
Berger, C.R.1
Guerriero, M.2
Zhou, S.3
Willett, P.4
|