-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24(2):84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
70449602456
-
Preserving source-location privacy in wireless sensor networks
-
Rome, Italy, June 22-26
-
Li Y, Ren J. Preserving source-location privacy in wireless sensor networks. In Proceedings of IEEE SECON 2009. Rome, Italy, June 22-26, 2009.
-
(2009)
Proceedings of IEEE SECON 2009
-
-
Li, Y.1
Ren, J.2
-
7
-
-
77953302309
-
Source-location privacy through dynamic routing in wireless sensor networks
-
San Diego, USA, March 15-19
-
Li Y, Ren J. Source-location privacy through dynamic routing in wireless sensor networks. In Proceedings of IEEE INFOCOM 2010. San Diego, USA, March 15-19, 2010.
-
(2010)
Proceedings of IEEE INFOCOM 2010
-
-
Li, Y.1
Ren, J.2
-
8
-
-
70449419921
-
Routing-based source-location privacy protection in wireless sensor networks
-
Windsor, Ontario, Canada, June 7-9
-
Li Y, Lightfoot L, Ren J. Routing-based source-location privacy protection in wireless sensor networks. In IEEE EIT 2009. Windsor, Ontario, Canada, June 7-9, 2009.
-
(2009)
IEEE EIT 2009
-
-
Li, Y.1
Lightfoot, L.2
Ren, J.3
-
9
-
-
84953801899
-
-
Wikipedia. Normal distribution.
-
Wikipedia. Normal distribution. http://en.wikipedia.org/wiki/Normal_distribution.
-
-
-
-
10
-
-
84970900556
-
-
http://www.panda.org/.
-
-
-
-
11
-
-
28444435923
-
EECS: an energy efficient clustering scheme in wireless sensor networks
-
Ye M, Li C, Chen G, Wu J. EECS: an energy efficient clustering scheme in wireless sensor networks. In Performance, Computing, and Communications Conference, 2005. IPCCC 2005. 24th IEEE International. April2005; 535-540.
-
(2005)
Performance, Computing, and Communications Conference, 2005. IPCCC 2005. 24th IEEE International
, pp. 535-540
-
-
Ye, M.1
Li, C.2
Chen, G.3
Wu, J.4
-
12
-
-
0003964743
-
Application-specific protocol architectures for wireless networks
-
PhD thesis, Supervisor-Anantha P. Chandrakasan and Supervisor-Hari Balakrishnan
-
Heinzelman WB. Application-specific protocol architectures for wireless networks. PhD thesis, Supervisor-Anantha P. Chandrakasan and Supervisor-Hari Balakrishnan, 2000.
-
(2000)
-
-
Heinzelman, W.B.1
-
13
-
-
33750394324
-
Asymmetric multihop communication in large sensor networks
-
International Symposium on Wireless Pervasive Computing 2006, Jan
-
Neander J, Hansen E, Nolin M, Bjorkman M. Asymmetric multihop communication in large sensor networks. International Symposium on Wireless Pervasive Computing 2006, Jan. 2006.
-
(2006)
-
-
Neander, J.1
Hansen, E.2
Nolin, M.3
Bjorkman, M.4
-
14
-
-
10944266504
-
HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
Younis O, Fahmy S. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing 2004; 3:366-379.
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
19
-
-
25844435733
-
PIKE: peer intermediaries for key establishment in sensor networks
-
Chan H, Perrig A. PIKE: peer intermediaries for key establishment in sensor networks. Proceedings IEEE INFOCOM 2005 2005; 1:524-535.
-
(2005)
Proceedings IEEE INFOCOM 2005
, vol.1
, pp. 524-535
-
-
Chan, H.1
Perrig, A.2
-
20
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy, July.
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar J. SPINS: Security protocols for sensor networks. In MobiCOM 2001. Rome, Italy, July2001.
-
(2001)
MobiCOM 2001
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
21
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
Traynor P, Kumar R, Choi H, Cao G, Zhu S, La Porta T. Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing 2007; 6:663-677.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
-
23
-
-
84871952782
-
Quantitative measurement and design of source-location privacy schemes for wireless sensor networks
-
accepted to appear.
-
Li Y, Ren J, Wu J. Quantitative measurement and design of source-location privacy schemes for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems accepted to appear.
-
IEEE Transactions on Parallel and Distributed Systems
-
-
Li, Y.1
Ren, J.2
Wu, J.3
|