-
2
-
-
38149062124
-
Security in wireless sensor networks
-
Giruka VC, Singhal M, Royalty J, Varanasi S. Security in wireless sensor networks. Wireless Communications and Mobile Computing 2008; 8(1):1-24.
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.1
, pp. 1-24
-
-
Giruka, V.C.1
Singhal, M.2
Royalty, J.3
Varanasi, S.4
-
3
-
-
64549108398
-
Security and privacy for distributed multimedia sensor networks
-
Kundur D, Luh W, Okorafor UN, Zourntos T. Security and privacy for distributed multimedia sensor networks. Proceedings of the IEEE 2008; 96(1): 112-130.
-
(2008)
Proceedings of the IEEE
, vol.96
, Issue.1
, pp. 112-130
-
-
Kundur, D.1
Luh, W.2
Okorafor, U.N.3
Zourntos, T.4
-
5
-
-
78651490108
-
Green modulations in energy-constrained wireless sensor networks
-
Abouei J, Plataniotis KN, Pasupathy S. Green modulations in energy-constrained wireless sensor networks. IET Communications 2011; 5(2): V240-V251.
-
(2011)
IET Communications
, vol.5
, Issue.2
, pp. V240-V251
-
-
Abouei, J.1
Plataniotis, K.N.2
Pasupathy, S.3
-
6
-
-
12844281082
-
A survey of solutions to the coverage problems in wireless sensor networks
-
Huang C-F, Tseng Y-C. A survey of solutions to the coverage problems in wireless sensor networks. Journal of Internet Technology 2005; 6(1):1-8.
-
(2005)
Journal of Internet Technology
, vol.6
, Issue.1
, pp. 1-8
-
-
Huang, C.-F.1
Tseng, Y.-C.2
-
7
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz IF, Su W, Sankarasubramanian Y, Cayirci E. A survey on sensor networks. IEEE Communications Magazine 2002; 40(8): 102-114.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramanian, Y.3
Cayirci, E.4
-
9
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly-secure key distribution for dynamic conferences. In Proceedings of the 29th International Cryptology Conference (CRYPTO), 1993.
-
(1993)
Proceedings of the 29th International Cryptology Conference (CRYPTO)
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
11
-
-
0017959977
-
Secure communications over insecure channels
-
Merkle RC. Secure communications over insecure channels. Communication of ACM 1978; 21(4): 294-299.
-
(1978)
Communication of ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
13
-
-
49249123418
-
Multi-path key establishment for wireless sensor networks using just enough redundancy transmission
-
Deng J, Han YS. Multi-path key establishment for wireless sensor networks using just enough redundancy transmission. IEEE Transactions on Dependable and Secure Computing 2008; 5(3):177-190.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.3
, pp. 177-190
-
-
Deng, J.1
Han, Y.S.2
-
16
-
-
34247221952
-
Combinatorial design of key distribution mechanisms for wireless sensor networks
-
Çamtepe SA, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transaction on Networking 2007; 15(2): 346-358.
-
(2007)
IEEE/ACM Transaction on Networking
, vol.15
, Issue.2
, pp. 346-358
-
-
Çamtepe, S.A.1
Yener, B.2
-
17
-
-
40049091352
-
On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs
-
5:1-5:35
-
Lee J, Stinson DR. On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security (TISSEC) 2008; 11(2): 5:1-5:35.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.11
, Issue.2
-
-
Lee, J.1
Stinson, D.R.2
-
20
-
-
35349015881
-
A canonical seed assignment model for key predistribution in wireless sensor networks
-
Tague P, Poovendran R. A canonical seed assignment model for key predistribution in wireless sensor networks. ACM Transactions on Sensor Networks 2007; 3(4): Article 19.
-
(2007)
ACM Transactions on Sensor Networks
, vol.3
, Issue.4
-
-
Tague, P.1
Poovendran, R.2
-
22
-
-
62949134817
-
Key establishment schemes against storage-bounded adversaries in wireless sensor networks
-
Tsai S-C, Tzeng W-G, Zhou K-Y. Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3): 1218-1222.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1218-1222
-
-
Tsai, S.-C.1
Tzeng, W.-G.2
Zhou, K.-Y.3
-
25
-
-
37849028668
-
A random perturbation-based scheme for pairwise key establishment in sensor networks
-
September 9-14, Montreal, QC, Canada
-
Zhang W, Tran M, Zhu S, Cao G. A random perturbation-based scheme for pairwise key establishment in sensor networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), September 9-14, Montreal, QC, Canada, 2007.
-
(2007)
Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
-
29
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM), 2004.
-
(2004)
Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM)
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
30
-
-
34548396246
-
Secure pairwise key establishment in large-scale sensor networks: an area partitioning and multigroup key predistribution approach
-
Huang D, Medhi D. Secure pairwise key establishment in large-scale sensor networks: an area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks (TOSN) 2007; 3(3): Article 16.
-
(2007)
ACM Transactions on Sensor Networks (TOSN)
, vol.3
, Issue.3
-
-
Huang, D.1
Medhi, D.2
-
33
-
-
75149183219
-
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks
-
Ruj S, Roy B. Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 2009; 6(1): Article 4.
-
(2009)
ACM Transactions on Sensor Networks (TOSN)
, vol.6
, Issue.1
-
-
Ruj, S.1
Roy, B.2
-
34
-
-
51649097218
-
A key management scheme using deployment knowledge for wireless sensor networks
-
Yu Z, Guan Y. A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2008; 19(10): 1411-1425.
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.10
, pp. 1411-1425
-
-
Yu, Z.1
Guan, Y.2
-
37
-
-
38349093891
-
LKE: a self-configuring scheme for location-aware key establishment in wireless sensor networks
-
Liu F, Cheng X. LKE: a self-configuring scheme for location-aware key establishment in wireless sensor networks. IEEE Transactions on Wireless Communications 2008; 7(1): 224-232.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.1
, pp. 224-232
-
-
Liu, F.1
Cheng, X.2
|