-
1
-
-
67549101202
-
Analysis and design of a hardware/software trusted platform module for embedded systems
-
Najwa Aaraj, Anand Raghunathan, and Niraj K. Jha. 2008. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Transactions on Embedded Computing Systems 8, 1, 1-31.
-
(2008)
ACM Transactions on Embedded Computing Systems
, vol.8
, Issue.1
, pp. 1-31
-
-
Aaraj, N.1
Raghunathan, A.2
Jha, N.K.3
-
2
-
-
37249006401
-
Distributed vision-based accident management for assisted living
-
Hamid Aghajan, Juan Carlos Augusto, ChenWu, Paul Mccullagh, and Julie-AnnWalkden. 2007. Distributed vision-based accident management for assisted living. In Proceedings of the International Conference on Smart Homes and Health Telematics. 196-205.
-
(2007)
Proceedings of the International Conference on Smart Homes and Health Telematics
, pp. 196-205
-
-
Aghajan, H.1
Augusto, J.C.2
Wu, C.3
McCullagh, P.4
Walkden, J.-A.5
-
4
-
-
33845708421
-
A survey on wireless multimedia sensor networks
-
Ian F. Akyildiz, Tommaso Melodia, and Kaushik R. Chowdhury. 2007. A survey on wireless multimedia sensor networks. Computer Networks 51, 4, 921-960.
-
(2007)
Computer Networks
, vol.51
, Issue.4
, pp. 921-960
-
-
Akyildiz, I.F.1
Melodia, T.2
Chowdhury, K.R.3
-
7
-
-
84905856889
-
-
ARM Limited. 2009. ARM Security Technology: Building a Secure System Using TrustZone Technology. Technical Report
-
ARM Limited. 2009. ARM Security Technology: Building a Secure System Using TrustZone Technology. Technical Report.
-
-
-
-
10
-
-
34249006260
-
A scalable signature scheme for video authentication
-
Pradeep K. Atrey, Wei-Qi Yan, and Mohan S. Kankanhalli. 2006. A scalable signature scheme for video authentication. Multimedia Tools and Applications 34, 1, 107-135.
-
(2006)
Multimedia Tools and Applications
, vol.34
, Issue.1
, pp. 107-135
-
-
Atrey, P.K.1
Yan, W.-Q.2
Kankanhalli, M.S.3
-
13
-
-
77956225749
-
The BehaviorScope framework for enabling ambient assisted living
-
March 2010
-
Athanasios Bamis, Dimitrios Lymberopoulos, Thiago Teixeira, and Andreas Savvides. 2010. The BehaviorScope framework for enabling ambient assisted living. Personal and Ubiquitous Computing 14, 6 (March 2010), 473-487.
-
(2010)
Personal and Ubiquitous Computing
, vol.14
, Issue.6
, pp. 473-487
-
-
Bamis, A.1
Lymberopoulos, D.2
Teixeira, T.3
Savvides, A.4
-
14
-
-
0002500694
-
Image authentication techniques for surveillance applications
-
Franco Bartolini, Anastasios Tefas, Mauro Barni, and Ioannis Pitas. 2001. Image authentication techniques for surveillance applications. Proceedings of the IEEE 89, 10, 1403-1418.
-
(2001)
Proceedings of the IEEE
, vol.89
, Issue.10
, pp. 1403-1418
-
-
Bartolini, F.1
Tefas, A.2
Barni, M.3
Pitas, I.4
-
15
-
-
77954765209
-
Autonomous audio-supported learning of visual classifiers for traffic monitoring
-
Horst Bischof, Martin Godec, Christian Leistner, Bernhard Rinner, and Andreas Starzacher. 2010. Autonomous audio-supported learning of visual classifiers for traffic monitoring. IEEE Intelligent Systems 25, 3, 15-23.
-
(2010)
IEEE Intelligent Systems
, vol.25
, Issue.3
, pp. 15-23
-
-
Bischof, H.1
Godec, M.2
Leistner, C.3
Rinner, B.4
Starzacher, A.5
-
16
-
-
36849045793
-
Secure time synchronization protocols for wireless sensor networks
-
Azzedine Boukerche and Damla Turgut. 2007. Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14, 5, 64-69.
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 64-69
-
-
Boukerche, A.1
Turgut, D.2
-
22
-
-
67651030465
-
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
-
May 2009
-
Claude Castelluccia, Aldar C-F. Chan, EinarMykletun, and Gene Tsudik. 2009. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks 5, 3 (May 2009), 1-36.
-
(2009)
ACM Transactions on Sensor Networks
, vol.5
, Issue.3
, pp. 1-36
-
-
Castelluccia, C.1
Chan, A.C.-F.2
Mykletun, E.3
Tsudik, G.4
-
24
-
-
85032751373
-
Privacy in video surveillance
-
March 2007
-
Andrea Cavallaro. 2007. Privacy in video surveillance. IEEE Signal Processing Magazine 24, 2 (March 2007), 168-169.
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.2
, pp. 168-169
-
-
Cavallaro, A.1
-
25
-
-
84905856890
-
-
Ph.D. Dissertation. Information &Privacy Commissioner Ontario, Canada
-
Ann Cavoukian. 2013a. Privacy by Design Centre of Excellence. Ph.D. Dissertation. Information &Privacy Commissioner Ontario, Canada.
-
(2013)
Privacy by Design Centre of Excellence
-
-
Cavoukian, A.1
-
27
-
-
0142103313
-
Security and privacy in sensor networks
-
Haowen Chan and Adrian Perrig. 2003. Security and privacy in sensor networks. IEEE Computer 36, 10, 103-105.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
30
-
-
33846785339
-
Tools for protecting the privacy of specific individuals in video
-
Datong Chen, Yi Chang, Rong Yan, and Jie Yang. 2007. Tools for protecting the privacy of specific individuals in video. EURASIP Journal on Applied Signal Processing 2007, 1, 107-116.
-
(2007)
EURASIP Journal on Applied Signal Processing 2007
, vol.1
, pp. 107-116
-
-
Chen, D.1
Chang, Y.2
Yan, R.3
Yang, J.4
-
31
-
-
39449126219
-
Determining image origin and integrity using sensor noise
-
Mo Chen, Jessica Fridrich, Miroslav Goljan, and Jan Lukas. 2008. Determining image origin and integrity using sensor noise. IEEE Transactions on Information Forensics and Security 3, 1, 74-90.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.1
, pp. 74-90
-
-
Chen, M.1
Fridrich, J.2
Goljan, M.3
Lukas, J.4
-
32
-
-
84905856892
-
-
Phoebus Wei-Chih Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Lenore Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Yang, Chuohao Yeo, Lung-Chung Chang
-
Phoebus Wei-Chih Chen, Parvez Ahammad, Colby Boyer, Shih-I Huang, Leon Lin, Edgar J. Lobaton, Marci Lenore Meingast, Songhwai Oh, Simon Wang, Posu Yan, Allen Yang, Chuohao Yeo, Lung-Chung Chang.
-
-
-
-
34
-
-
67650844989
-
Sensor network security: A survey
-
Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou. 2009. Sensor network security: A survey. IEEE Communications Surveys and Tutorials 11, 2, 52-73.
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
38
-
-
0000755808
-
Image analysis and rule-based reasoning for a traffic monitoring system
-
June 2000
-
Rita Cucchiara, Massimo Piccardi, and Paola Mello. 2000. Image analysis and rule-based reasoning for a traffic monitoring system. IEEE Transactions on Intelligent Transportation Systems 1, 2 (June 2000), 119-130.
-
(2000)
IEEE Transactions on Intelligent Transportation Systems
, vol.1
, Issue.2
, pp. 119-130
-
-
Cucchiara, R.1
Piccardi, M.2
Mello, P.3
-
39
-
-
30344482882
-
INSENS: Intrusion-tolerant routing for wireless sensor networks
-
January 2006
-
Jing Deng, R. Han, and Shivakant Mishra. 2006. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications 29, 2 (January 2006), 216-230.
-
(2006)
Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
46
-
-
79959557051
-
Reconfigurable trusted computing in hardware
-
Thomas Eisenbarth, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Dries Schellekens, and Marko Wolf. 2007. Reconfigurable trusted computing in hardware. In Proceedings of the Workshop on Scalable Trusted Computing. 15-20.
-
(2007)
Proceedings of the Workshop on Scalable Trusted Computing
, pp. 15-20
-
-
Eisenbarth, T.1
Güneysu, T.2
Paar, C.3
Sadeghi, A.-R.4
Schellekens, D.5
Wolf, M.6
-
50
-
-
69949163699
-
Privacy-preserving face recognition
-
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, and Tomas Toft. 2009. Privacy-preserving face recognition. In Proceedings of the International Symposium on Privacy Enhancing Technologies. 235-253.
-
(2009)
Proceedings of the International Symposium on Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
51
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Zekeriya Erkin, Alessandro Piva, Stefan Katzenbeisser, R. L. Lagendijk, Jamshid Shokrollahi, Gregory Neven, and Mauro Barni. 2007. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security 2007, 20.
-
(2007)
EURASIP Journal on Information Security 2007
, pp. 20
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
52
-
-
0038665379
-
Surveillance nation (part i
-
Dan Farmer and Charles C. Mann. 2003. Surveillance nation (part I). Technology Review 4, 34-43.
-
(2003)
Technology Review
, vol.4
, pp. 34-43
-
-
Farmer, D.1
Mann, C.C.2
-
54
-
-
55649119763
-
Smart camera based monitoring system and its application to assisted living
-
Sven Fleck and Wolfgang Straßer. 2008. Smart camera based monitoring system and its application to assisted living. Proceedings of the IEEE 96, 10, 1698-1714.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.10
, pp. 1698-1714
-
-
Fleck, S.1
Straßer, W.2
-
56
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Gary L. Friedman. 1993. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics 39, 4, 905-910.
-
(1993)
IEEE Transactions on Consumer Electronics
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.L.1
-
58
-
-
49449093129
-
Secure time synchronization in sensor networks
-
Saurabh Ganeriwal, Christina Poepper, Srdjan Capkun, andMani B. Srivastava. 2008. Secure time synchronization in sensor networks. ACM Transactions on Sensor Networks 11, 4, 1-35.
-
(2008)
ACM Transactions on Sensor Networks
, vol.11
, Issue.4
, pp. 1-35
-
-
Ganeriwal, S.1
Poepper, C.2
Capkun, S.3
Srivastava, M.B.4
-
59
-
-
49749102763
-
A system architecture for reconfigurable trusted platforms
-
Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus D. Müller-Glaser, and Jürgen Becker. 2008a. A system architecture for reconfigurable trusted platforms. In Proceedings of the Conference on Design, Automation and Test in Europe. 541-544.
-
(2008)
Proceedings of the Conference on Design, Automation and Test in Europe
, pp. 541-544
-
-
Glas, B.1
Klimm, A.2
Sander, O.3
Klaus, D.M.-D.4
Becker, J.5
-
60
-
-
51549101299
-
A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates
-
Benjamin Glas, Alexander Klimm, David Schwab, Klaus D. Müller-Glaser, and Jürgen Becker. 2008b. A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates. In Proceedings of the International Symposium on Rapid System Prototyping. 135-141.
-
(2008)
Proceedings of the International Symposium on Rapid System Prototyping
, pp. 135-141
-
-
Glas, B.1
Klimm, A.2
Schwab, D.3
Müller-Glaser, K.D.4
Becker, J.5
-
62
-
-
38149048562
-
Security for mobile low power nodes in a personal area network by means of trusted platform modules
-
Ulrich Grossmann, Enrik Berkhan, Luciana C. Jatoba, Joerg Ottenbacher, Wilhelm Stork, and Klaus D. Müller-Glaser. 2007. Security for mobile low power nodes in a personal area network by means of trusted platform modules. In Proceedings of theWorkshop on Security and Privacy in Ad Hoc and Sensor Networks. 172-186.
-
(2007)
Proceedings of TheWorkshop on Security and Privacy in Ad Hoc and Sensor Networks
, pp. 172-186
-
-
Grossmann, U.1
Berkhan, E.2
Jatoba, L.C.3
Ottenbacher, J.4
Stork, W.5
Klaus, D.M.-G.6
-
63
-
-
85032770601
-
Smart video surveillance for proactive security
-
July 2008
-
Arun Hampapur. 2008. Smart video surveillance for proactive security. IEEE Signal Processing Magazine 25, 4 (July 2008), 134-136.
-
(2008)
IEEE Signal Processing Magazine
, vol.25
, Issue.4
, pp. 134-136
-
-
Hampapur, A.1
-
64
-
-
34547519691
-
S3: The IBM smart surveillance system: From transactional systems to observational systems
-
Arun Hampapur, S. Borger, Lisa Brown, C. Carlson, Jonathan Connell, Max Lu, Andrew Senior, V. Reddy, Chiao Fe Shu, and Ying-Li Tian. 2007. S3: The IBM smart surveillance system: From transactional systems to observational systems. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing. 1385-1388.
-
(2007)
Proceedings of the International Conference on Acoustics, Speech and Signal Processing
, pp. 1385-1388
-
-
Hampapur, A.1
Borger, S.2
Brown, L.3
Carlson, C.4
Connell, J.5
Lu, M.6
Senior, A.7
Reddy, V.8
Shu, C.F.9
Tian, Y.-L.10
-
65
-
-
84905856883
-
-
HART Communication Foundation. 2010. WirelessHART Security Overview. Retrieved October 2013
-
HART Communication Foundation. 2010. WirelessHART Security Overview. Retrieved October 2013 from http://www.hartcomm.org.
-
-
-
-
68
-
-
57349192113
-
DMCTRAC: Distributed multi camera tracking
-
Martin Hoffmann, MichaelWittke, Yvonne Bernard, Ramin Soleymani, and Jorg Hahner. 2008. DMCTRAC: Distributed multi camera tracking. In Proceedings of the International Conference on Distributed Smart Cameras. 10.
-
(2008)
Proceedings of the International Conference on Distributed Smart Cameras
, pp. 10
-
-
Hoffmann, M.1
Wittke, M.2
Bernard, Y.3
Soleymani, R.4
Hahner, J.5
-
69
-
-
79954510617
-
Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction
-
Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. In Proceedings of SPIE. 12.
-
(2011)
Proceedings of SPIE
, pp. 12
-
-
Hsu, C.-Y.1
Lu, C.-S.2
Pei, S.-C.3
-
71
-
-
77956128351
-
Toward trusted wireless sensor networks
-
August 2010
-
Wen Hu, Hailun Tan, Peter Corke, Wen Chan Shih, and Sanjay Jha. 2010. Toward trusted wireless sensor networks. ACM Transactions on Sensor Networks 7, 1 (August 2010), 25.
-
(2010)
ACM Transactions on Sensor Networks
, vol.7
, Issue.1
, pp. 25
-
-
Hu, W.1
Tan, H.2
Corke, P.3
Shih, W.C.4
Jha, S.5
-
72
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
January 2005
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11, 1-2 (January 2005), 21-38.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
73
-
-
84905856884
-
-
ISA100 Wireless Compliance Institute. 2011. ISA-100.11.a Wireless Standard. Retrieved October 2013
-
ISA100 Wireless Compliance Institute. 2011. ISA-100.11.a Wireless Standard. Retrieved October 2013 from http://www.isa100wci.org.
-
-
-
-
76
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Chris Karlof and David Wagner. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1, 2-3, 293-315.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
78
-
-
84870625999
-
Subjective study of privacy filters in video surveillance
-
Pavel Korshunov, C. Araimo, Francesca Desimone Simone, C. Velardo, J.-L. Dugelay, and Touradj Ebrahimi. 2012a. Subjective study of privacy filters in video surveillance. In Proceedings of the International Workshop on Multimedia Signal Processing. 5.
-
(2012)
Proceedings of the International Workshop on Multimedia Signal Processing
, pp. 5
-
-
Korshunov, P.1
Araimo, C.2
Simone, F.D.3
Velardo, C.4
Dugelay, J.-L.5
Ebrahimi, T.6
-
83
-
-
85032751121
-
Encrypted signal processing for privacy protection
-
Reginald L. Lagendijk, Zekeriya Erkin, and Mauro Barni. 2013. Encrypted signal processing for privacy protection. IEEE Signal Processing Magazine 30, 1, 82-105.
-
(2013)
IEEE Signal Processing Magazine
, vol.30
, Issue.1
, pp. 82-105
-
-
Lagendijk, R.L.1
Erkin, Z.2
Barni, M.3
-
84
-
-
77952591585
-
Source camera identification using enhanced sensor pattern noise
-
June 2010
-
Chang-tsun Li. 2010. Source camera identification using enhanced sensor pattern noise. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 280-287.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.2
, pp. 280-287
-
-
Li, C.-T.1
-
85
-
-
77649241623
-
Recoverable privacy protection for video content distribution
-
Guangzhen Li, Yoshimichi Ito, Xiaoyi Yu, Naoko Nitta, and Noboru Babaguchi. 2009. Recoverable privacy protection for video content distribution. EURASIP Journal on Information Security 2009, 11.
-
(2009)
EURASIP Journal on Information Security 2009
, pp. 11
-
-
Li, G.1
Ito, Y.2
Yu, X.3
Nitta, N.4
Babaguchi, N.5
-
90
-
-
84947943261
-
Protecting digital media content
-
July 1998
-
Nasir Memon and Ping Wah Wong. 1998. Protecting digital media content. Communications of the ACM 41, 7 (July 1998), 35-43.
-
(1998)
Communications of the ACM
, vol.41
, Issue.7
, pp. 35-43
-
-
Memon, N.1
Wong, P.W.2
-
91
-
-
18444390289
-
A network of co-operative cameras for visual surveillance
-
Christian Micheloni, Gian Luca Foresti, and Lauro Snidaro. 2005. A network of co-operative cameras for visual surveillance. IEEE Proceedings on Vision, Image and Signal Processing 152, 2, 205-212.
-
(2005)
IEEE Proceedings on Vision, Image and Signal Processing
, vol.152
, Issue.2
, pp. 205-212
-
-
Micheloni, C.1
Foresti, G.L.2
Snidaro, L.3
-
92
-
-
70350619334
-
A secure digital camera architecture for integrated real-time digital rights management
-
October 2009
-
Saraju P. Mohanty. 2009. A secure digital camera architecture for integrated real-time digital rights management. Journal of Systems Architecture 55, 10-12 (October 2009), 468-480.
-
(2009)
Journal of Systems Architecture
, vol.55
, Issue.10-12
, pp. 468-480
-
-
Mohanty, S.P.1
-
93
-
-
70349449310
-
Dynamic privacy in public surveillance
-
September 2009
-
Simon Moncrieff, Svetha Venkatesh, and Geoff West. 2009. Dynamic privacy in public surveillance. IEEE Computer 42, 9 (September 2009), 22-28.
-
(2009)
IEEE Computer
, vol.42
, Issue.9
, pp. 22-28
-
-
Moncrieff, S.1
Venkatesh, S.2
West, G.3
-
94
-
-
72949104155
-
A survey on jamming attacks and countermeasures in WSNs
-
Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. 2009. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials 11, 4, 1-14.
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.11
, Issue.4
, pp. 1-14
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
95
-
-
84899611447
-
-
Technical Report. Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria
-
Steven Ney and Kurt Pichler. 2002. Video Surveillance in Austria. Technical Report. Interdisciplinary Centre for Comparative Research in the Social Sciences, Austria.
-
(2002)
Video Surveillance in Austria
-
-
Ney, S.1
Pichler, K.2
-
98
-
-
84905856876
-
-
OpenStreetMap.org. 2011. OpenStreetMap.org Video Surveillance Camera Overlay. Retrieved April 2011
-
OpenStreetMap.org. 2011. OpenStreetMap.org Video Surveillance Camera Overlay. Retrieved April 2011 from http://osm.vdska.de.
-
-
-
-
100
-
-
84905856878
-
-
CCTV Camera Positions in Paris. Retrieved March 2012
-
OWNI. 2011. CCTV Camera Positions in Paris. Retrieved March 2012 from http://app.owni.fr/camera-paris.
-
(2011)
-
-
-
101
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
August 2009
-
Suat Ozdemir and Yang Xiao. 2009. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53, 12 (August 2009), 2022-2037.
-
(2009)
Computer Networks
, vol.53
, Issue.12
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
103
-
-
4243082091
-
Security in wireless sensor networks
-
Adrian Perrig, John A. Stankovic, and David Wagner. 2004. Security in wireless sensor networks. Communications of the ACM 47, 6, 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.A.2
Wagner, D.3
-
104
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, J.D. Tygar, VictorWen, andDavid E. Culler. 2002. SPINS: Security protocols for sensor networks. Wireless Networks 8, 5, 521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
106
-
-
37149000571
-
Power analysis attacks and countermeasures
-
Thomas Popp, Stefan Mangard, and Elisabeth Oswald. 2007. Power analysis attacks and countermeasures. IEEE Design and Test of Computers 24, 6, 535-543.
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 535-543
-
-
Popp, T.1
Mangard, S.2
Oswald, E.3
-
107
-
-
79960882539
-
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
-
Christina Popper, Mario Strasser, and Srdjan Capkun. 2010. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28, 5, 1-13.
-
(2010)
IEEE Journal on Selected Areas in Communications
, vol.28
, Issue.5
, pp. 1-13
-
-
Popper, C.1
Strasser, M.2
Capkun, S.3
-
109
-
-
33947139151
-
Autonomous multicamera tracking on embedded smart cameras
-
Markus Quaritsch, Markus Kreuzthaler, Bernhard Rinner, Horst Bischof, and Bernhard Strobl. 2007. Autonomous multicamera tracking on embedded smart cameras. EURASIP Journal on Embedded Systems 2007, 1, 10.
-
(2007)
EURASIP Journal on Embedded Systems 2007
, vol.1
, pp. 10
-
-
Quaritsch, M.1
Kreuzthaler, M.2
Rinner, B.3
Bischof, H.4
Strobl, B.5
-
110
-
-
34249030190
-
Practical solution to authentication of images with a secure camera
-
Jean-Jacques Quisquater, Benoit Macq, Marc Joye, N. Degand, and A. Bernard. 1997. Practical solution to authentication of images with a secure camera. Storage and Retrieval for Image and Video Databases 3022, 1, 290-297.
-
(1997)
Storage and Retrieval for Image and Video Databases
, vol.3022
, Issue.1
, pp. 290-297
-
-
Quisquater, J.-J.1
MacQ, B.2
Joye, M.3
Degand, N.4
Bernard, A.5
-
112
-
-
84905869044
-
Cyclops: In situ image sensing and interpretation in wireless sensor networks
-
Mohammad Rahimi, Rick Baer, Obimdinachi I. Iroezi, Juan C. Garcia, JayWarrior,Deborah Estrin, and Mani B. Srivastava. 2005. Cyclops: In situ image sensing and interpretation in wireless sensor networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems. 13.
-
(2005)
Proceedings of the International Conference on Embedded Networked Sensor Systems
, pp. 13
-
-
Rahimi, M.1
Baer, R.2
Iroezi, O.I.3
Garcia, J.C.4
Warrior, J.5
Estrin, D.6
Srivastava, M.B.7
-
113
-
-
78349274893
-
A real-time privacy-sensitive data hiding approach based on chaos cryptography
-
Mizanur Rahman, M. Anwar Hossain, Hussein Mouftah, A. El Saddik, and Eiji Okamoto. 2010. A real-time privacy-sensitive data hiding approach based on chaos cryptography. In Proceedings of the International Conference on Multimedia and Expo. 72-77.
-
(2010)
Proceedings of the International Conference on Multimedia and Expo
, pp. 72-77
-
-
Rahman, M.1
Hossain, M.A.2
Mouftah, H.3
El Saddik, A.4
Okamoto, E.5
-
114
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
David R. Raymond, Scott F. Midkiff, Anthony Wood, and John A. Stankovic. 2008. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7, 1, 74-81.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.1
, pp. 74-81
-
-
Raymond, D.R.1
Midkiff, S.F.2
Wood, A.3
Stankovic, J.A.4
-
116
-
-
55549116307
-
A bright future for distributed smart cameras
-
October 2008
-
Bernhard Rinner and Wayne Wolf. 2008. A bright future for distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1562-1564.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.10
, pp. 1562-1564
-
-
Rinner, B.1
Wolf, W.2
-
119
-
-
78349240352
-
Privacy modeling for video data publication
-
Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, Sabu Emmanuel, and Mohan S. Kankanhalli. 2010. Privacy modeling for video data publication. In Proceedings of the International Conference on Multimedia and Expo. 60-65.
-
(2010)
Proceedings of the International Conference on Multimedia and Expo
, pp. 60-65
-
-
Saini, M.1
Atrey, P.K.2
Mehrotra, S.3
Emmanuel, S.4
Kankanhalli, M.S.5
-
121
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Kimaya Sanzgiri, Daniel Laflamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. 2005. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 23, 3, 598-610.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Laflamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Elizabeth, M.B.-R.6
-
123
-
-
51349121612
-
Respectful cameras: Selecting visual markers in real-time to address privacy concerns
-
Jeremy Schiff, Marci Meingast, Deirdre K. Mulligan, Shankar Sastry, and Kenneth Y. Goldberg. 2007. Respectful cameras: Selecting visual markers in real-time to address privacy concerns. In Proceedings of the International Conference on Intelligent Robots and Systems. 971-978.
-
(2007)
Proceedings of the International Conference on Intelligent Robots and Systems
, pp. 971-978
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.K.3
Sastry, S.4
Goldberg, K.Y.5
-
124
-
-
80053251267
-
Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design
-
Adolph Seema and Martin Reisslein. 2011. Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design. IEEE Communications Surveys and Tutorials 13, 3, 462-486.
-
(2011)
IEEE Communications Surveys and Tutorials
, vol.13
, Issue.3
, pp. 462-486
-
-
Seema, A.1
Reisslein, M.2
-
126
-
-
20844455524
-
Enabling video privacy through computer vision
-
Andrew Senior, Sharath Pankanti, Arun Hampapur, Lisa Brown, Ying-Li Tian, Ahmet Ekin, Jonathan Connell, Chiao Fe Shu, and Max Lu. 2005. Enabling video privacy through computer vision. IEEE Security and Privacy Magazine 3, 3, 50-57.
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Fe Shu, C.8
Lu, M.9
-
127
-
-
55549106767
-
Security and privacy in distributed smart cameras
-
October 2008
-
Dimitrios N. Serpanos and Andreas Papalambrou. 2008. Security and privacy in distributed smart cameras. Proceedings of the IEEE 96, 10 (October 2008), 1678-1687.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.10
, pp. 1678-1687
-
-
Serpanos, D.N.1
Papalambrou, A.2
-
128
-
-
84905863893
-
-
Stefaan Seys, Claudia Diaz, Bart De Win, Vincent Naessens, Caroline Goemans, Joris Claessens, Wim Moreau, Bart De Decker, Jos Dumortier, and Bart Preneel. 2001. APES Anonymity and Privacy in Electronic Services. Technical Report.
-
(2001)
APES Anonymity and Privacy in Electronic Services
-
-
Seys, S.1
Diaz, C.2
De Win, B.3
Naessens, V.4
Goemans, C.5
Claessens, J.6
Moreau, W.7
De Decker, B.8
Dumortier, J.9
Preneel, B.10
-
129
-
-
51349167764
-
Fleck: A platform for realworld outdoor sensor networks
-
Pavan Sikka, Peter Corke, Leslie Overs, Philip Valencia, and Tim Wark. 2007. Fleck: A platform for realworld outdoor sensor networks. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information. 709-714.
-
(2007)
Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information
, pp. 709-714
-
-
Sikka, P.1
Corke, P.2
Overs, L.3
Valencia, P.4
Wark, T.5
-
130
-
-
84905856872
-
-
Dmitry Sklyarov. 2010. Forging Canon Original Decision Data. Retrieved April 2011
-
Dmitry Sklyarov. 2010. Forging Canon Original Decision Data. Retrieved April 2011 from http://www. elcomsoft.com/canon.html.
-
-
-
-
131
-
-
33749987832
-
Attack-resilient time synchronization for wireless sensor networks
-
January 2007
-
Hui Song, Sencun Zhu, and Guohong Cao. 2007. Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5, 1 (January 2007), 112-125.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 112-125
-
-
Song, H.1
Zhu, S.2
Cao, G.3
-
133
-
-
78649596958
-
Privacy in video surveilled areas
-
Torsten Spindler, ChristophWartmann, Ludger Hovestadt, Daniel Roth, Luc van Gool, and Andreas Steffen. 2006. Privacy in video surveilled areas. In Proceedings of the International Conference on Privacy, Security and Trust. 10.
-
(2006)
Proceedings of the International Conference on Privacy, Security and Trust
, pp. 10
-
-
Spindler, T.1
Wartmann, C.2
Hovestadt, L.3
Roth, D.4
Van Gool, L.5
Steffen, A.6
-
134
-
-
34547282118
-
TinySeRSync: Secure and resilient time synchronization in wireless sensor networks
-
Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou. 2006. TinySeRSync: Secure and resilient time synchronization in wireless sensor networks. In Proceedings of the Conference on Computer and Communications Security. 14.
-
(2006)
Proceedings of the Conference on Computer and Communications Security
, pp. 14
-
-
Sun, K.1
Ning, P.2
Wang, C.3
Liu, A.4
Zhou, Y.5
-
135
-
-
13944269967
-
Clock synchronization for wireless sensor networks: A survey
-
Bharath Sundararaman, Ugo Buy, and Ajay D. Kshemkalyani. 2005. Clock synchronization for wireless sensor networks: A survey. Ad Hoc Networks 3, 4, 281-323.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.4
, pp. 281-323
-
-
Sundararaman, B.1
Buy, U.2
Kshemkalyani, A.D.3
-
142
-
-
84905856873
-
-
Trusted Computing Group. 2011. TPM Main Specification 1.2, Level 2, Revision 116. Retrieved October 2013
-
Trusted Computing Group. 2011. TPM Main Specification 1.2, Level 2, Revision 116. Retrieved October 2013 from http://www.trustedcomputinggroup.org/ resources/tpm-main-specification.
-
-
-
-
145
-
-
33947151456
-
SCCS: A scalable clustered camera system for multiple object tracking communicating via message passing interface
-
Senem Velipasalar, Jason Schlessman, Cheng-yao Chen,WayneWolf, and Jaswinder Pal Singh. 2006. SCCS: A scalable clustered camera system for multiple object tracking communicating via message passing interface. In Proceedings of the International Conference on Multimedia and Expo. 277-280.
-
(2006)
Proceedings of the International Conference on Multimedia and Expo
, pp. 277-280
-
-
Velipasalar, S.1
Schlessman, J.2
Chen, C.-Y.3
Wolf, W.4
Singh, J.P.5
-
147
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Yong Wang, Garhan Attebury, and Byrav Ramamurthy. 2006. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials 8, 2, 2-23.
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
148
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
Dirk Westhoff, Joao Girao, and Mithun Acharya. 2006. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing 5, 10, 1417-1431.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
153
-
-
84861687858
-
User centric privacy awareness in video surveillance
-
Thomas Winkler and Bernhard Rinner. 2012. User centric privacy awareness in video surveillance. Multimedia Systems Journal 18, 2, 99-121.
-
(2012)
Multimedia Systems Journal
, vol.18
, Issue.2
, pp. 99-121
-
-
Winkler, T.1
Rinner, B.2
-
155
-
-
70349253246
-
Trusted computing building blocks for embedded Linux-based arm trustzone platforms
-
Johannes Winter. 2008. Trusted computing building blocks for embedded Linux-based arm trustzone platforms. In Proceedings of the Workshop on Scalable Trusted Computing. 21-30.
-
(2008)
Proceedings of the Workshop on Scalable Trusted Computing
, pp. 21-30
-
-
Winter, J.1
-
157
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
Wenyuan Xu, Ke Ma, Wade Trappe, and Yanyong Zhang. 2006. Jamming sensor networks: Attack and defense strategies. IEEE Network 20, 3, 41-47.
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
160
-
-
34250306851
-
Tiny-sync: Tight time synchronization for wireless sensor networks
-
Suyoung Yoon, Chanchai Veerarittiphan, and Mihail L. Sichitiu. 2007. Tiny-sync: Tight time synchronization for wireless sensor networks. ACM Transactions on Sensor Networks 3, 2, 1-33.
-
(2007)
ACM Transactions on Sensor Networks
, vol.3
, Issue.2
, pp. 1-33
-
-
Yoon, S.1
Veerarittiphan, C.2
Sichitiu, M.L.3
-
161
-
-
70350692585
-
Securing wireless sensor networks: A survey
-
Yun Zhou, Yuguang Fang, and Yanchao Zhang. 2008. Securing wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials 10, 3, 6-28.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
162
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
Sencun Zhu, Sanjeev Setia, and Sushil Jajodia. 2006. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2, 4, 500-528.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
163
-
-
84905856874
-
-
ZigBee Consortium Web Site. Retrieved October 2013
-
ZigBee Alliance. 2012. ZigBee Consortium Web Site. Retrieved October 2013 from http://www.zigbee.org/
-
(2012)
-
-
|