-
1
-
-
84877273324
-
-
INFSO D.4 Networked Enterprise &RFID, INFSO G.2 Micro &NanoSystems in co-operation with the RFIDWorking Group of the European Technology Platform on Smart Systems Integration (EPoSS Online]. Available:
-
INFSO D.4 Networked Enterprise &RFID, INFSO G.2 Micro &NanoSystems in co-operation with the RFIDWorking Group of the European Technology Platform on Smart Systems Integration (EPoSS). Internet of Things in 2020: Roadmap for the Future [Online]. Available: http://www.caba.org/resources/Documents/IS-2008-93.pdf
-
Internet of Things in 2020: Roadmap for the Future
-
-
-
2
-
-
77956877124
-
The internet of things: A survey
-
Oct
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010
-
(2010)
Comput. Netw
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
84861997111
-
Internet of Things: Vision, applications and research challenges
-
Sep
-
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, "Internet of Things: Vision, applications and research challenges," Ad Hoc Netw., vol. 10, no. 7, pp. 1497-1516, Sep. 2012
-
(2012)
Ad Hoc Netw
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
4
-
-
84928029704
-
Security and privacy challenges in the Internet of Things
-
Feb
-
C. P. Mayer, "Security and privacy challenges in the Internet of Things," Electron. Commun. EASST, vol. 17, Feb. 2009
-
(2009)
Electron. Commun. EASST
, vol.17
-
-
Mayer, C.P.1
-
5
-
-
59249104484
-
Protecting your daily in-home activity information from a wireless snooping attack
-
V. Srinivasan, J. Stankovic, and K. Whitehouse, "Protecting your daily in-home activity information from a wireless snooping attack," in Proc. 10th Int. Conf. Ubiquit. Comput. (UbiComp), 2008, pp. 202-211
-
(2008)
Proc. 10th Int. Conf. Ubiquit. Comput. (UbiComp
, pp. 202-211
-
-
Srinivasan, V.1
Stankovic, J.2
Whitehouse, K.3
-
6
-
-
70349682315
-
An efficient privacy-preserving scheme against traffic analysis attacks in network coding
-
Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An efficient privacy-preserving scheme against traffic analysis attacks in network coding," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2009, pp. 2213-2221
-
(2009)
Proc. IEEE Conf. Comput. Commun. (INFOCOM
, pp. 2213-2221
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Shen, X.4
-
7
-
-
84864253438
-
Statistical identification of encrypted Web browsing traffic
-
Q. Sun et al., "Statistical identification of encrypted Web browsing traffic," in Proc. IEEE Symp. Secur. Privacy, 2002, pp. 19-30
-
(2002)
Proc. IEEE Symp. Secur. Privacy
, pp. 19-30
-
-
Sun, Q.1
-
9
-
-
67249144515
-
An efficient privacy-preserving scheme for wireless link layer security
-
Y. Fan, B. Lin, Y. Jiang, and X. Shen, "An efficient privacy-preserving scheme for wireless link layer security," in Proc. IEEE Global TeleCommun. Conf. (GLOBECOM08), 2008, pp. 1-5
-
(2008)
Proc. IEEE Global TeleCommun. Conf. (GLOBECOM08
, pp. 1-5
-
-
Fan, Y.1
Lin, B.2
Jiang, Y.3
Shen, X.4
-
10
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
Sep
-
Y. Zhang,W. Liu,W. Lou, and Y. Fang, "MASK: Anonymous on-demand routing in mobile ad hoc networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 2376-2385, Sep. 2006
-
(2006)
IEEE Trans. Wireless Commun
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhangw. Liuw. Lou, Y.1
Fang, Y.2
-
11
-
-
84873449020
-
Cloud-enabled privacypreserving collaborative learning for mobile sensing
-
B. Liu, Y. Jiang, F. Sha, and R. Govindan, "Cloud-enabled privacypreserving collaborative learning for mobile sensing," in Proc. 10th ACM Conf. Embedded Netw. Sensor Syst. (SenSys), 2012, pp. 57-70
-
(2012)
Proc. 10th ACM Conf. Embedded Netw. Sensor Syst. (SenSys
, pp. 57-70
-
-
Liu, B.1
Jiang, Y.2
Sha, F.3
Govindan, R.4
-
13
-
-
84908423349
-
-
Apigy Inc. Online]. Available: accessed on Feb
-
Apigy Inc. Lockitron-Keyless Entry Using Your Phone [Online]. Available: https://lockitron.com/, accessed on Feb. 28, 2014
-
(2014)
Lockitron-Keyless Entry Using Your Phone
, vol.28
-
-
-
14
-
-
34547426847
-
Funneling-mac: A localized, sink-oriented mac for boosting fidelity in sensor networks
-
G.-S. Ahn, S. G. Hong, E. Miluzzo, A. T. Campbell, and F. Cuomo, "Funneling-MAC: A localized, sink-oriented MAC for boosting fidelity in sensor networks," in Proc. 4th ACM Conf. Embedded Netw. Sensor Syst. (SenSys), 2006, pp. 293-306
-
(2006)
Proc. 4th ACM Conf. Embedded Netw. Sensor Syst. (SenSys
, pp. 293-306
-
-
Ahn, G.-S.1
Hong, S.G.2
Miluzzo, E.3
Campbell, A.T.4
Cuomo, F.5
-
16
-
-
45749132181
-
Z-mac: A hybrid mac for wireless sensor networks
-
Jun
-
I. Rhee, A. Warrier, M. Aia, J. Min, and M. L. Sichitiu, "Z-MAC: A hybrid MAC for wireless sensor networks," IEEE ACM Trans. Netw., vol. 16, no. 3, pp. 511-524, Jun. 2008
-
(2008)
IEEE ACM Trans. Netw
, vol.16
, Issue.3
, pp. 511-524
-
-
Rhee, I.1
Warrier, A.2
Aia, M.3
Min, J.4
Sichitiu, M.L.5
-
17
-
-
70449640450
-
TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks
-
Dec
-
W.-Z. Song, R. Huang, B. Shirazi, and R. LaHusen, "TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks," Pervasive Mob. Comput., vol. 5, no. 6, pp. 750-765, Dec. 2009
-
(2009)
Pervasive Mob. Comput
, vol.5
, Issue.6
, pp. 750-765
-
-
Song, W.-Z.1
Huang, R.2
Shirazi, B.3
Lahusen, R.4
-
18
-
-
37549016465
-
Toward in-band self-organization in energyefficientMAC protocols for sensor networks
-
Feb
-
F. Yu, T.Wu, and S. Biswas, "Toward in-band self-organization in energyefficientMAC protocols for sensor networks,"IEEE Trans.Mob. Comput., vol. 7, no. 2, pp. 156-170, Feb. 2008
-
(2008)
IEEE Trans.Mob. Comput
, vol.7
, Issue.2
, pp. 156-170
-
-
Yu, F.1
Wu, T.2
Biswas, S.3
-
19
-
-
69749115933
-
A scheduling algorithm for TDMAbased MAC protocol in wireless sensor networks
-
Y. Zhang, S. Zheng, and S. Xiong, "A scheduling algorithm for TDMAbased MAC protocol in wireless sensor networks," in Proc. 1st Int. Workshop Educ. Technol. Comput. Sci. (ETCS09), 2009, vol. 3, pp. 148-151
-
(2009)
Proc. 1st Int. Workshop Educ. Technol. Comput. Sci. (ETCS9
, vol.3
, pp. 148-151
-
-
Zhang, Y.1
Zheng, S.2
Xiong, S.3
-
20
-
-
70349297218
-
DRAND: Distributed randomized TDMA scheduling for wireless ad hoc networks
-
Oct
-
I. Rhee, A. Warrier, J. Min, and L. Xu, "DRAND: Distributed randomized TDMA scheduling for wireless ad hoc networks," IEEE Trans. Mob. Comput., vol. 8, no. 10, pp. 1384-1396, Oct. 2009
-
(2009)
IEEE Trans. Mob. Comput
, vol.8
, Issue.10
, pp. 1384-1396
-
-
Rhee, I.1
Warrier, A.2
Min, J.3
Xu, L.4
-
21
-
-
70349671119
-
Energy efficient TDMA sleep scheduling in wireless sensor networks
-
J. Ma,W. Lou, Y.Wu,M. Li, and G. Chen, "Energy efficient TDMA sleep scheduling in wireless sensor networks," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2009, pp. 630-638
-
(2009)
Proc. IEEE Conf. Comput. Commun. (INFOCOM
, pp. 630-638
-
-
Ma, J.1
Lou, W.2
Wu, Y.3
Li, M.4
Chen, G.5
-
22
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Hiding, London, U.K
-
A. Back, U.Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Proc. 4th Int. Workshop Inf. Hiding, London, U.K., 2001, pp. 245-257
-
(2001)
Proc. 4th Int. Workshop Inf
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
23
-
-
79952992733
-
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
-
Mar
-
Y. Fan, Y. Jiang, H. Zhu, J. Chen, and X. S. Shen, "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 834-843, Mar. 2011
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.3
, pp. 834-843
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Chen, J.4
Shen, X.S.5
-
24
-
-
80051908209
-
Defending against traffic analysis in wireless networks through traffic reshaping
-
F. Zhang, W. He, and X. Liu, "Defending against traffic analysis in wireless networks through traffic reshaping," in Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS), 2011, pp. 593-602
-
(2011)
Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS
, pp. 593-602
-
-
Zhang, F.1
He, W.2
Liu, X.3
-
25
-
-
35348850729
-
DESYNC: Self-organizing desynchronization and TDMA on wireless sensor networks
-
J. Degesys, I. Rose, A. Patel, and R. Nagpal, "DESYNC: Self-organizing desynchronization and TDMA on wireless sensor networks," in Proc. 6th Int. Symp. Inf. Process. Sensor Netw. (IPSN07), 2007, pp. 11-20
-
(2007)
Proc. 6th Int. Symp. Inf. Process. Sensor Netw. (IPSN07
, pp. 11-20
-
-
Degesys, J.1
Rose, I.2
Patel, A.3
Nagpal, R.4
-
27
-
-
26444451023
-
Versatile low power media access for wireless sensor networks
-
J. Polastre, J. Hill, and D. Culler, "Versatile low power media access for wireless sensor networks," in Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst. (SenSys), 2004, pp. 95-107
-
(2004)
Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst. (SenSys
, pp. 95-107
-
-
Polastre, J.1
Hill, J.2
Culler, D.3
-
28
-
-
34548302058
-
Energy efficient sleep/wake scheduling for multi-hop sensor networks: Non-convexity and approximation algorithm
-
Y.Wu, S. Fahmy, and N. B. Shroff, "Energy efficient sleep/wake scheduling for multi-hop sensor networks: Non-convexity and approximation algorithm," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2007, pp. 1568-1576
-
(2007)
Proc. IEEE Conf. Comput. Commun. (INFOCOM
, pp. 1568-1576
-
-
Wu, Y.1
Fahmy, S.2
Shroff, N.B.3
-
30
-
-
84861593746
-
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks
-
Z.Wan, K. Xing, and Y. Liu, "Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2012, pp. 73-81
-
(2012)
Proc. IEEE Conf. Comput. Commun. (INFOCOM
, pp. 73-81
-
-
Wan, Z.1
Xing, K.2
Liu, Y.3
-
33
-
-
0035727921
-
A dynamic mix method for wireless ad hoc networks
-
S. Jiang, N. F. Vaidya, andW. Zhao, "A dynamic mix method for wireless ad hoc networks," in Proc. IEEE Mil. Commun. Conf. (MILCOM), 2001, vol. 2, pp. 873-877
-
(2001)
Proc. IEEE Mil. Commun. Conf. (MILCOM
, vol.2
, pp. 873-877
-
-
Jiang, S.1
Vaidya, W.2
Zhao, N.F.3
-
35
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix systems," in Proc. 8th Int. Financial Cryptogr. Conf. (FC4), 2004, vol. 3110, pp. 251-265
-
(2004)
Proc. 8th Int. Financial Cryptogr. Conf. (FC04
, vol.3110
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
36
-
-
75449104170
-
Smart objects as building blocks for the Internet of Things
-
Jan
-
G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy, "Smart objects as building blocks for the Internet of Things," IEEE Internet Comput., vol. 14, no. 1, pp. 44-51, Jan. 2010
-
(2010)
IEEE Internet Comput
, vol.14
, Issue.1
, pp. 44-51
-
-
Kortuem, G.1
Kawsar, F.2
Fitton, D.3
Sundramoorthy, V.4
-
37
-
-
44449175231
-
Vehicular ad hoc networks (VANETs): Challenges and perspectives
-
S. Yousefi, M. S. Mousavi, and M. Fathy, "Vehicular ad hoc networks (VANETs): Challenges and perspectives," in Proc. 6th Int. Conf. ITS Telecommun., 2006, pp. 761-766
-
(2006)
Proc. 6th Int. Conf. ITS Telecommun
, pp. 761-766
-
-
Yousefi, S.1
Mousavi, M.S.2
Fathy, M.3
-
38
-
-
84877651380
-
Distributed TDMA for privacy sensitive anonymous networks
-
D. Banerjee, M. Taghizadeh, and S. Biswas, "Distributed TDMA for privacy sensitive anonymous networks," in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2012, pp. 609-615
-
(2012)
Proc. IEEE Global Commun. Conf. (GLOBECOM
, pp. 609-615
-
-
Banerjee, D.1
Taghizadeh, M.2
Biswas, S.3
|