-
1
-
-
51249107460
-
-
Network Working Group Std. RFC 4919, Aug
-
N. Kushalnagar, G. Montenegro, and C. Schumacher, IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals., Network Working Group Std. RFC 4919, Aug 2007.
-
(2007)
IPv6 Over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
2
-
-
33746690237
-
-
Network Working Group Std. RFC 4944, Sep
-
G. Deloche, N. Kushalnagar, J. Hui, and D. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, Network Working Group Std. RFC 4944, Sep 2007.
-
(2007)
Transmission of IPv6 Packets Over IEEE 802.15.4 Networks
-
-
Deloche, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
3
-
-
70449633122
-
Security analysis survey and framework design for IP connected LoWPANs
-
R. Riaz, K. Kim, and H. Ahmed, "Security analysis survey and framework design for IP connected LoWPANs," in Proceedings of International Symposium on Autonomous Decentralised Systems, 2009, pp. 29-34.
-
(2009)
Proceedings of International Symposium on Autonomous Decentralised Systems
, pp. 29-34
-
-
Riaz, R.1
Kim, K.2
Ahmed, H.3
-
4
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
Oakland, California, USA
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, USA, 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
5
-
-
32844459414
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Jan-Mar
-
W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," IEEE Transactions on Dependable and Secure Computing, Vol. 3, pp. 62-77, Jan-Mar 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.3
Chen, S.4
Varshney, P.5
-
6
-
-
84988248149
-
Key management in IP-based ubiquitous sensor networks: Issues, challenges and solutions
-
Dubai, Feb
-
st Int. Conference of Ubiquitous Information Technology, Dubai, Feb 2007.
-
(2007)
st Int. Conference of Ubiquitous Information Technology
-
-
Hasan, M.1
Akbar, A.2
Riaz, R.3
Biswas, S.4
Kim, K.5
Yoo, S.6
Roh, B.7
-
8
-
-
56949106654
-
A unified security framework with three key management schemes for wireless sensor networks
-
R. Riaz, A. Naureen, A. Akram, A. Akbar, K. Kim, and H. Ahmed, "A unified security framework with three key management schemes for wireless sensor networks." Computer Communications - COMCOM, Vol. 31, no. 18, pp. 4269-4280, 2008.
-
(2008)
Computer Communications - COMCOM
, vol.31
, Issue.18
, pp. 4269-4280
-
-
Riaz, R.1
Naureen, A.2
Akram, A.3
Akbar, A.4
Kim, K.5
Ahmed, H.6
-
10
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
June
-
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in Proceedings of International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), June 2011, pp. 1-8.
-
(2011)
Proceedings of International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, T.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
11
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, USA
-
th ACM conference on Computer and communications security, Washington, DC, USA, 2002, pp. 41-47.
-
(2002)
th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
13
-
-
77954886398
-
Geographic server distribution model for key revocation
-
August
-
S. Misra, S. Goswami, G. Pathak, N. Shah, and I. Woungang, "Geographic server distribution model for key revocation," Telecommunication Systems, Vol. 44, no. 3-4, pp. 281-295, August 2010.
-
(2010)
Telecommunication Systems
, vol.44
, Issue.3-4
, pp. 281-295
-
-
Misra, S.1
Goswami, S.2
Pathak, G.3
Shah, N.4
Woungang, I.5
-
14
-
-
78751641700
-
Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks
-
February
-
S. Misra, S. Goswami, G. Pathaka, and N. Shah, "Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks," Wireless Communications and Mobile Computing, Vol. 11, no. 2, pp. 146-162, February 2011.
-
(2011)
Wireless Communications and Mobile Computing
, vol.11
, Issue.2
, pp. 146-162
-
-
Misra, S.1
Goswami, S.2
Pathaka, G.3
Shah, N.4
|