-
1
-
-
33750319005
-
Security in wireless sensor networks: Issues and challenges
-
A. K. Pathan, H.-W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of ICACT 2006, vol. 2, 2006, pp. 1043-1048.
-
(2006)
Proceedings of ICACT 2006
, vol.2
, pp. 1043-1048
-
-
Pathan, A.K.1
Lee, H.-W.2
Hong, C.S.3
-
2
-
-
23944447698
-
A security architecture for mobile wireless sensor networks
-
Springer-Verlag
-
S. Schmidt, H. Krahn, S. Fischer, and D. Wätjen, "A security architecture for mobile wireless sensor networks," in Proceedings of the First European Conference on Security in Ad-hoc and Sensor Networks. Springer-Verlag, 2005, pp. 166-177.
-
(2005)
Proceedings of the First European Conference on Security in Ad-hoc and Sensor Networks
, pp. 166-177
-
-
Schmidt, S.1
Krahn, H.2
Fischer, S.3
Wätjen, D.4
-
3
-
-
0034865628
-
Diagnosis of sensor networks
-
C. Jaikaeo, C. Srisathapornphat, and C.-C. Shen, "Diagnosis of sensor networks," in Proceedings of ICC 2001, vol. 5, 2001, pp. 1627-1632.
-
(2001)
Proceedings of ICC 2001
, vol.5
, pp. 1627-1632
-
-
Jaikaeo, C.1
Srisathapornphat, C.2
Shen, C.-C.3
-
4
-
-
25844521520
-
Localized fault-tolerant event boundary detection in sensor networks
-
M. Ding, D. Chen, K. Xing, and X. Cheng, "Localized fault-tolerant event boundary detection in sensor networks," in Proceedings of INFOCOM 2005, vol. 2, 2005, pp. 902-913.
-
(2005)
Proceedings of INFOCOM 2005
, vol.2
, pp. 902-913
-
-
Ding, M.1
Chen, D.2
Xing, K.3
Cheng, X.4
-
5
-
-
33751074195
-
Feedback: Towards dynamic behavior and secure routing for wireless sensor networks
-
Z. Cao, J. Hu, Z. Chen, M. Xu, and X. Zhou, "Feedback: towards dynamic behavior and secure routing for wireless sensor networks," in Proceedings of AINA 2006, vol. 2, 2006, pp. 160-164.
-
(2006)
Proceedings of AINA 2006
, vol.2
, pp. 160-164
-
-
Cao, Z.1
Hu, J.2
Chen, Z.3
Xu, M.4
Zhou, X.5
-
6
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
D. Liu, P. Ning, S. Zhu, and S. Jajodia, "Practical broadcast authentication in sensor networks," in Proceedings of MobiQuitous 2005, 2005, pp. 118-129.
-
(2005)
Proceedings of MobiQuitous 2005
, pp. 118-129
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
7
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," Signal Processing, IEEE Transactions on, vol. 57, no. 5, pp. 1976-1986, 2009.
-
(2009)
Signal Processing, IEEE Transactions on
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.K.3
-
8
-
-
79957989409
-
Secure distributed detection in the presence of eavesdroppers
-
V. S. S. Nadendla, H. Chen, and P. K. Varshney, "Secure distributed detection in the presence of eavesdroppers," in Proceedings of ASILOMAR 2010, 2010, pp. 1437-1441.
-
(2010)
Proceedings of ASILOMAR 2010
, pp. 1437-1441
-
-
Nadendla, V.S.S.1
Chen, H.2
Varshney, P.K.3
-
9
-
-
84905281153
-
Tandem distributed Bayesian detection with privacy constraints
-
Z. Li and T. J. Oechtering, "Tandem distributed Bayesian detection with privacy constraints," accepted by ICASSP 2014.
-
(2014)
Accepted by ICASSP
-
-
Li, Z.1
Oechtering, T.J.2
-
10
-
-
84906767126
-
Parallel distributed Neyman-Pearson detection with privacy constraints
-
Z. Li, T. J. Oechtering, and J. Jaldén, "Parallel distributed Neyman-Pearson detection with privacy constraints," submitted to ICC 2014 Workshop.
-
ICC 2014 Workshop
-
-
Li, Z.1
Oechtering, T.J.2
Jaldén, J.3
-
14
-
-
0024736656
-
Distributed Bayesian signal detection
-
I. Y. Hoballah and P. K. Varshney, "Distributed Bayesian signal detection," Information Theory, IEEE Transactions on, vol. 35, no. 5, pp. 995-1000, 1989.
-
(1989)
Information Theory, IEEE Transactions on
, vol.35
, Issue.5
, pp. 995-1000
-
-
Hoballah, I.Y.1
Varshney, P.K.2
|