-
1
-
-
33750319005
-
Security in wireless sensor networks: Issues and challenges
-
A. K. Pathan, H.-W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges, " in Proceedings of ICACT 2006, vol. 2, 2006, pp. 1043-1048.
-
(2006)
Proceedings of ICACT 2006
, vol.2
, pp. 1043-1048
-
-
Pathan, A.K.1
Lee, H.-W.2
Hong, C.S.3
-
2
-
-
23944447698
-
A security architecture for mobile wireless sensor networks
-
Springer-Verlag
-
S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, "A security architecture for mobile wireless sensor networks, " in Proceedings of the First European Conference on Security in Ad-hoc and Sensor Networks. Springer-Verlag, 2005, pp. 166-177.
-
(2005)
Proceedings of the First European Conference on Security in Ad-hoc and Sensor Networks.
, pp. 166-177
-
-
Schmidt, S.1
Krahn, H.2
Fischer, S.3
Watjen, D.4
-
3
-
-
0034865628
-
Diagnosis of sensor networks
-
C. Jaikaeo, C. Srisathapornphat, and C.-C. Shen, "Diagnosis of sensor networks, " in Proceedings of ICC 2001, vol. 5, 2001, pp. 1627-1632.
-
(2001)
Proceedings of ICC 2001
, vol.5
, pp. 1627-1632
-
-
Jaikaeo, C.1
Srisathapornphat, C.2
Shen, C.-C.3
-
4
-
-
25844521520
-
Localized fault-tolerant event boundary detection in sensor networks
-
M. Ding, D. Chen, K. Xing, and X. Cheng, "Localized fault-tolerant event boundary detection in sensor networks, " in Proceedings of INFOCOM 2005, vol. 2, 2005, pp. 902-913.
-
(2005)
Proceedings of INFOCOM 2005
, vol.2
, pp. 902-913
-
-
Ding, M.1
Chen, D.2
Xing, K.3
Cheng, X.4
-
5
-
-
33751074195
-
Feedback: Towards dynamic behavior and secure routing for wireless sensor networks
-
Z. Cao, J. Hu, Z. Chen, M. Xu, and X. Zhou, "Feedback: Towards dynamic behavior and secure routing for wireless sensor networks, " in Proceedings of AINA 2006, vol. 2, 2006, pp. 160-164.
-
(2006)
Proceedings of AINA
, vol.2
, pp. 160-164
-
-
Cao, Z.1
Hu, J.2
Chen, Z.3
Xu, M.4
Zhou, X.5
-
6
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks, " in Proceedings of MobiQuitous 2005, 2005, pp. 118-129.
-
(2005)
Proceedings of MobiQuitous 2005
, pp. 118-129
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
7
-
-
84890526507
-
Optimal distributed detection in the presence of Byzantines
-
B. Kailkhura, S. Brahma, Y. S. Han, and P. K. Varshney, "Optimal distributed detection in the presence of Byzantines, " in Proceedings of ICASSP 2013, 2013, pp. 2925-2929.
-
(2013)
Proceedings of ICASSP 2013
, pp. 2925-2929
-
-
Kailkhura, B.1
Brahma, S.2
Han, Y.S.3
Varshney, P.K.4
-
8
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy, " Signal Processing, IEEE Transactions on, vol. 57, no. 5, pp. 1976-1986, 2009.
-
(2009)
Signal Processing, IEEE Transactions on
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.K.3
-
9
-
-
79957989409
-
Secure distributed detection in the presence of eavesdroppers
-
V. S. S. Nadendla, H. Chen, and P. K. Varshney, "Secure distributed detection in the presence of eavesdroppers, " in Proceedings of ASILOMAR 2010, 2010, pp. 1437-1441.
-
(2010)
Proceedings of ASILOMAR 2010
, pp. 1437-1441
-
-
Nadendla, V.S.S.1
Chen, H.2
Varshney, P.K.3
-
11
-
-
84906767126
-
Parallel distributed neyman-pearson detection with privacy constraints
-
Workshop
-
Z. Li, T. J. Oechtering, and J. Jaldén, "Parallel distributed Neyman-Pearson detection with privacy constraints, " accepted by ICC 2014 Workshop.
-
(2014)
Accepted by ICC
-
-
Li, Z.1
Oechtering, T.J.2
Jaldén, J.3
-
12
-
-
33746335051
-
Differential privacy
-
Springer
-
C. Dwork, "Differential privacy, " in Proceedings of ICALP 2006. Springer, 2006, pp. 1-12.
-
(2006)
Proceedings of ICALP 2006
, pp. 1-12
-
-
Dwork, C.1
-
14
-
-
84878330331
-
Utilityprivacy tradeoffs in databases: An information-theoretic approach
-
L. Sankar, S. R. Rajagopalan, and H. V. Poor, "Utilityprivacy tradeoffs in databases: an information-theoretic approach, " Information Forensics and Security, IEEE Transactions on, vol. 8, no. 6, pp. 838-852, 2013.
-
(2013)
Information Forensics and Security, IEEE Transactions on
, vol.8
, Issue.6
, pp. 838-852
-
-
Sankar, L.1
Rajagopalan, S.R.2
Poor, H.V.3
-
16
-
-
0024736656
-
Distributed Bayesian signal detection
-
I. Y. Hoballah and P. K. Varshney, "Distributed Bayesian signal detection, " Information Theory, IEEE Transactions on, vol. 35, no. 5, pp. 995-1000, 1989.
-
(1989)
Information Theory, IEEE Transactions on
, vol.35
, Issue.5
, pp. 995-1000
-
-
Hoballah, I.Y.1
Varshney, P.K.2
|