-
2
-
-
33746690237
-
-
Tech. Rep. 4944, September
-
G. Montenegro, N. Kushalnagar, J. Hui, D. Culler, Transmission of ipv6 Packets over IEEE 802.15.4 Networks, Tech. Rep. 4944, September 2007.
-
(2007)
Transmission of ipv6 Packets over IEEE 802.15.4 Networks
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
3
-
-
69549093492
-
The NOPP O-SCOPE and MOSEAN projects: Advanced sensing for ocean observing systems
-
T. Dickey, N. Bates, R.H. Byrne, G. Chang, F.P. Chavez, R.A. Feely, A.K. Hanson, D.M. Karl, D. Manov, C. Moore, C.L. Sabine, and R. Wanninkhof The NOPP O-SCOPE and MOSEAN projects: advanced sensing for ocean observing systems Oceanography 22 2 2009 168 181
-
(2009)
Oceanography
, vol.22
, Issue.2
, pp. 168-181
-
-
Dickey, T.1
Bates, N.2
Byrne, R.H.3
Chang, G.4
Chavez, F.P.5
Feely, R.A.6
Hanson, A.K.7
Karl, D.M.8
Manov, D.9
Moore, C.10
Sabine, C.L.11
Wanninkhof, R.12
-
5
-
-
34247859642
-
Telemonitoring or structured telephone support programmes for patients with chronic heart failure: Systematic review and meta-analysis
-
R.A. Clark, S.C. Inglis, F.A. McAlister, J.G.F. Cleland, and S. Stewart Telemonitoring or structured telephone support programmes for patients with chronic heart failure: systematic review and meta-analysis BMJ: Brit. Med. J. 334 7600 2007 942 950
-
(2007)
BMJ: Brit. Med. J.
, vol.334
, Issue.7600
, pp. 942-950
-
-
Clark, R.A.1
Inglis, S.C.2
McAlister, F.A.3
Cleland, J.G.F.4
Stewart, S.5
-
6
-
-
84863560791
-
Ladon: End-to-end authorisation support for resource-deprived environments
-
J. Astorga, E. Jacob, M. Huarte, and M. Higuero Ladon: end-to-end authorisation support for resource-deprived environments IET Inform. Secur. 6 2 2012 93 101
-
(2012)
IET Inform. Secur.
, vol.6
, Issue.2
, pp. 93-101
-
-
Astorga, J.1
Jacob, E.2
Huarte, M.3
Higuero, M.4
-
7
-
-
34548525381
-
A middleware architecture for privacy protection
-
DOI 10.1016/j.comnet.2007.06.010, PII S1389128607001685, Innovations in Web Communications Infrastructure
-
G.V. Lioudakis, E.A. Koutsoloukas, N.L. Dellas, N. Tselikas, S. Kapellaki, G.N. Prezerakos, D.I. Kaklamani, and I.S. Venieris A middleware architecture for privacy protection Comput. Netw. 51 16 2007 4679 4696 (Pubitemid 47385366)
-
(2007)
Computer Networks
, vol.51
, Issue.16
, pp. 4679-4696
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Dellas, N.L.3
Tselikas, N.4
Kapellaki, S.5
Prezerakos, G.N.6
Kaklamani, D.I.7
Venieris, I.S.8
-
8
-
-
80051783332
-
PrivaKERB: A user privacy framework for Kerberos
-
F. Pereniguez, R. Marin-Lopez, G. Kambourakis, S. Gritzalis, and A. Gomez PrivaKERB: a user privacy framework for Kerberos Comput. Secur. 6 7 2011 446 463
-
(2011)
Comput. Secur.
, vol.6
, Issue.7
, pp. 446-463
-
-
Pereniguez, F.1
Marin-Lopez, R.2
Kambourakis, G.3
Gritzalis, S.4
Gomez, A.5
-
9
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler SPINS: security protocols for sensor networks ACM Wireless Netw. 8 5 2002 521 534
-
(2002)
ACM Wireless Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
11
-
-
47649113722
-
An energy efficient link-layer security protocol for wireless sensor networks
-
L.E. Lighfoot, J. Ren, T. Li, An energy efficient link-layer security protocol for wireless sensor networks, in: Proceedings of the 2007 IEEE International Conference on Electro/Information Technology, 2007, pp. 233-238.
-
(2007)
Proceedings of the 2007 IEEE International Conference on Electro/Information Technology
, pp. 233-238
-
-
Lighfoot, L.E.1
Ren, J.2
Li, T.3
-
12
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
DOI 10.1145/1236360.1236421, IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor MiniSec: a secure sensor network communication architecture Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN '07) 2007 ACM Press New York, NY, USA 479 488 (Pubitemid 47582178)
-
(2007)
IPSN 2007: Proceedings of the Sixth International Symposium on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
13
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
DOI 10.1109/TMC.2007.70753, 4358997
-
K. Ren, W. Lou, and Y. Zhang LEDS: providing location-aware end-to-end data security in wireless sensor networks IEEE Trans. Mobile Comput. 7 5 2008 585 598 (Pubitemid 351454006)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
14
-
-
10044284351
-
LEAP: Efficient security mechanisms for large-scale distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
S. Zhu, S. Setia, and S. Jajodia LEAP: efficient security mechanisms for large-scale distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) 2003 ACM New York, NY, USA 62 72 (Pubitemid 40673789)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
15
-
-
85016596484
-
LiSP: A lightweight security protocol for wireless sensor networks
-
T. Park, and K.G. Shin LiSP: a lightweight security protocol for wireless sensor networks ACM Trans. Embed. Comput. Syst. 3 3 2004 634 660
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 634-660
-
-
Park, T.1
Shin, K.G.2
-
16
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
H. Chan, A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, in: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), 2005, pp. 524-535. (Pubitemid 41390848)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
17
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
D. Liu, and P. Ning Establishing pairwise keys in distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) 2003 ACM New York, NY, USA 52 61 (Pubitemid 40673788)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
19
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
ACM New York, NY, USA
-
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus TinyPK: securing sensor networks with public key technology Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04) 2004 ACM New York, NY, USA 59 64
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Fen Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
20
-
-
33750300697
-
LSec: Lightweight security protocol for distributed wireless sensor network
-
Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings
-
R.A. Shaikh, S. Lee, M.A.U. Khan, Y.J. Song, LSec: lightweight security protocol for distributed wireless sensor network, in: Proceedings of the 11th IFIP International Conference on Personal Wireless Communications (PWC'06), 2006, pp. 367-377. (Pubitemid 44617828)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 367-377
-
-
Shaikh, R.A.1
Lee, S.2
Khan, M.A.U.3
Song, Y.J.4
-
21
-
-
80054769623
-
A scalable ID-based pairwise key establishment protocol for wireless sensor networks
-
H.-C. Lin, and Y.-M. Tseng A scalable ID-based pairwise key establishment protocol for wireless sensor networks J. Comput. 18 2 2007 13 24
-
(2007)
J. Comput.
, vol.18
, Issue.2
, pp. 13-24
-
-
Lin, H.-C.1
Tseng, Y.-M.2
-
22
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
G. de Meulenaer, F. Gosset, F.X. Standaert, O. Pereira, On the energy cost of communication and cryptography in wireless sensor networks, in: Proceedings of the 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB '08), 2008, pp. 580-585.
-
(2008)
Proceedings of the 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB '08)
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.X.3
Pereira, O.4
-
23
-
-
33751508709
-
-
NIST Special Publication 800-57
-
E. Barker, W. Barker, W. Burr, W. Polk, M. Smid, NIST Special Publication 800-57. Recommendation for Key Management - Part 1, 2012.
-
(2012)
Recommendation for Key Management-Part 1
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
24
-
-
84897701714
-
-
OAuth
-
OAuth. < http://oauth.net/ >.
-
-
-
-
25
-
-
84897718536
-
-
OpenID
-
OpenID. < http://openid.net/ >.
-
-
-
-
26
-
-
84897684142
-
-
Shibboleth
-
Shibboleth. < http://shibboleth.net/ >.
-
-
-
-
27
-
-
28144446331
-
-
Tech. Rep. 4120, July
-
C. Neuman, T. Yu, S. Hartman, K. Raeburn, The kerberos network authentication service (v5), Tech. Rep. 4120, July 2005.
-
(2005)
The Kerberos Network Authentication Service (v5)
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
28
-
-
0000874415
-
Limitations of the Kerberos authentication system
-
S.M. Bellovin, and M. Merritt Limitations of the Kerberos authentication system SIGCOMM Comput. Commun. Rev. 20 5 1990 119 132
-
(1990)
SIGCOMM Comput. Commun. Rev.
, vol.20
, Issue.5
, pp. 119-132
-
-
Bellovin, S.M.1
Merritt, M.2
-
29
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
L. Gong A security risk of depending on synchronized clocks SIGOPS Operat. Syst. Rev. 26 1 1992 49 53
-
(1992)
SIGOPS Operat. Syst. Rev.
, vol.26
, Issue.1
, pp. 49-53
-
-
Gong, L.1
-
30
-
-
0028466968
-
SESAME: The solution to security for open distributed systems
-
P. Kaijser, T. Parker, and D. Pinkas SESAME: the solution to security for open distributed systems Comput. Commun. 17 7 1994 501 518
-
(1994)
Comput. Commun.
, vol.17
, Issue.7
, pp. 501-518
-
-
Kaijser, P.1
Parker, T.2
Pinkas, D.3
-
32
-
-
84897718537
-
-
Internet-Draft draft-iet-krb-wg-general-pac-01.txt IETF Secretariat, May
-
S. Sorce, T. Hardjono, T. Yu, A generalized PAC for Kerberos v5, Internet-Draft draft-iet-krb-wg-general-pac-01.txt, IETF Secretariat, May 2012.
-
(2012)
A Generalized PAC for Kerberos v5
-
-
Sorce, S.1
Hardjono, T.2
Yu, T.3
-
33
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
K. Mehta, D. Liu, M. Wright, Location privacy in sensor networks against a global eavesdropper, in: Proceedings of the IEEE International Conference on Network Protocols (ICNP '07), 2007, pp. 314-323.
-
(2007)
Proceedings of the IEEE International Conference on Network Protocols (ICNP '07)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
34
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, G. Cao, Towards statistically strong source anonymity for sensor networks, in: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM '08), 2008, pp. 51-55.
-
(2008)
Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM '08)
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
35
-
-
55649095270
-
Location privacy and anonymity preserving routing for wireless sensor networks
-
A.A. Nezhad, A. Miri, and D. Makrakis Location privacy and anonymity preserving routing for wireless sensor networks Comput. Netw. 52 18 2008 3433 3452
-
(2008)
Comput. Netw.
, vol.52
, Issue.18
, pp. 3433-3452
-
-
Nezhad, A.A.1
Miri, A.2
Makrakis, D.3
-
36
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.227, 4215809, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Y. Jian, S. Chen, Z. Zhang, L. Zhang, Protecting receiver-location privacy in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), 2007, pp. 1955-1963. (Pubitemid 47334427)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
37
-
-
34848852681
-
Temporal privacy in wireless sensor networks
-
P. Kamat, W. Xu, W. Trappe, Y. Zhang, Temporal privacy in wireless sensor networks, in: Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS '07), 2007.
-
(2007)
Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS '07)
-
-
Kamat, P.1
Xu, W.2
Trappe, W.3
Zhang, Y.4
-
38
-
-
84863522640
-
Distributed privacy-preserving access control in sensor networks
-
R. Zhang, Y. Zhang, and K. Ren Distributed privacy-preserving access control in sensor networks IEEE Trans. Parall. Distrib. Syst. 23 8 2012 1427 1438
-
(2012)
IEEE Trans. Parall. Distrib. Syst.
, vol.23
, Issue.8
, pp. 1427-1438
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
39
-
-
80051783946
-
-
Internet-Draft draft-ietf-cat-kerberos-anoncred-00.txt, Internet Engineering Task Force, work in progress, March
-
A. Medvinsky, J. Cargille, M. Hur, Anonymous credentials in Kerberos, Internet-Draft draft-ietf-cat-kerberos-anoncred-00.txt, Internet Engineering Task Force, work in progress, March 1998.
-
(1998)
Anonymous Credentials in Kerberos
-
-
Medvinsky, A.1
Cargille, J.2
Hur, M.3
-
43
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A. Yao On the security of public key protocols IEEE Trans. Inform. Theor. 29 2 1983 198 208
-
(1983)
IEEE Trans. Inform. Theor.
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
44
-
-
34547251000
-
Performance analysis of IEEE 802.15.4 and ZigBee for large-scale wireless sensor network applications
-
DOI 10.1145/1163610.1163619, PE-WASUN 2006: Proceedings of the Third ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
-
M. Kohvakka, M. Kuorilehto, M. Hännikäinen, and T.D. Hämäläinen Performance analysis of IEEE 802.15.4 and ZigBee for large-scale wireless sensor network applications Proceedings of the 3rd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor and Ubiquitous Networks (PE-WASUN '06) 2006 ACM New York, NY, USA 48 57 (Pubitemid 47143768)
-
(2006)
PE-WASUN 2006: Proceedings of the Third ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
, pp. 48-57
-
-
Kohvakka, M.1
Kuorilehto, M.2
Mannikainen, M.3
Hamalainen, T.D.4
-
45
-
-
84898619345
-
Optimizing AES for embedded devices and wireless sensor networks
-
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium
-
S. Didla, A. Ault, S. Bagchi, Optimizing AES for embedded devices and wireless sensor networks, in: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TridentCom '08), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, 2008, pp. 4:1-4:10.
-
(2008)
Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TridentCom '08)
, pp. 41-410
-
-
Didla, S.1
Ault, A.2
Bagchi, S.3
-
46
-
-
84897684144
-
-
http://www.cryptopp.com/benchmarks.html.
-
-
-
-
48
-
-
34748898963
-
The energy cost of cryptographic key establishment in wireless sensor networks
-
DOI 10.1145/1229285.1229334, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
J. Grosschädl, A. Szekely, and S. Tillich The energy cost of cryptographic key establishment in wireless sensor networks Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07) 2007 ACM New York, NY, USA 380 382 (Pubitemid 47479257)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 380-382
-
-
Groschadl, J.1
Szekely, A.2
Tillich, S.3
|