-
1
-
-
84920267499
-
MPR: Multi-point relay protocol for underwater acoustic networks
-
New York, NY, USA
-
J. Alves, R. Petroccia, and J. R. Potter. MPR: Multi-Point Relay Protocol for Underwater Acoustic Networks. In Proceedings of ACM WUWNet '14, pages 16:1-16:8, New York, NY, USA, 2014.
-
(2014)
Proceedings of ACM WUWNet '14
, pp. 161-168
-
-
Alves, J.1
Petroccia, R.2
Potter, J.R.3
-
2
-
-
84961866802
-
Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques?
-
San Diego, CA, USA, Febraury 24-27
-
G. Ateniese, G. Bianchi, A. T. Capossele, and C. Petrioli. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? In Proceedings of NDSS 2013, San Diego, CA, USA, Febraury 24-27 2013.
-
(2013)
Proceedings of NDSS 2013
-
-
Ateniese, G.1
Bianchi, G.2
Capossele, A.T.3
Petrioli, C.4
-
3
-
-
84957702488
-
SecFUN: Security Framework for Underwater acoustic sensor Networks
-
Genova, Italy, May
-
G. Ateniese, A. T. Capossele, P. Gjanci, C. Petrioli, and D. Spaccini. SecFUN: Security Framework for Underwater acoustic sensor Networks. In Proceedings of MTS/IEEE OCEANS 2015, pages 1-9, Genova, Italy, May 2015.
-
(2015)
Proceedings of MTS/IEEE OCEANS 2015
, pp. 1-9
-
-
Ateniese, G.1
Capossele, A.T.2
Gjanci, P.3
Petrioli, C.4
Spaccini, D.5
-
4
-
-
84908068632
-
Multipath routing with limited cross-path interference in underwater networks
-
Oct.
-
S. Azad, P. Casari, and M. Zorzi. Multipath routing with limited cross-path interference in underwater networks. IEEE Wireless Communications Letters, 3(5):465-468, Oct. 2014.
-
(2014)
IEEE Wireless Communications Letters
, vol.3
, Issue.5
, pp. 465-468
-
-
Azad, S.1
Casari, P.2
Zorzi, M.3
-
5
-
-
84949987632
-
CARP: A channel-aware routing protocol for underwater acoustic wireless networks
-
August
-
S. Basagni, C. Petrioli, R. Petroccia, and D. Spaccini. CARP: A channel-aware routing protocol for underwater acoustic wireless networks. Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks, Available on-line, August 2014.
-
(2014)
Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks
-
-
Basagni, S.1
Petrioli, C.2
Petroccia, R.3
Spaccini, D.4
-
6
-
-
84863983623
-
Optimized packet size selection in underwater wireless sensor network communications
-
July
-
S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic. Optimized packet size selection in underwater wireless sensor network communications. IEEE Journal of Oceanic Engineering, 37(3):321-337, July 2012.
-
(2012)
IEEE Journal of Oceanic Engineering
, vol.37
, Issue.3
, pp. 321-337
-
-
Basagni, S.1
Petrioli, C.2
Petroccia, R.3
Stojanovic, M.4
-
7
-
-
78649281092
-
Flexible key exchange negotiation for wireless sensor networks
-
Chicago, Illinois, USA
-
G. Bianchi, A. T. Capossele, A. Mei, and C. Petrioli. Flexible Key Exchange Negotiation for Wireless Sensor Networks. In Proceedings of ACM WiNTECH 2010, Chicago, Illinois, USA, 2010.
-
(2010)
Proceedings of ACM WiNTECH 2010
-
-
Bianchi, G.1
Capossele, A.T.2
Mei, A.3
Petrioli, C.4
-
8
-
-
84885325732
-
AGREE: Exploiting energy harvesting to support data-centric access control in WSNs
-
G. Bianchi, A. T. Capossele, C. Petrioli, and D. Spenza. AGREE: exploiting energy harvesting to support data-centric access control in WSNs. Ad hoc networks, 11(8):2625-2636, 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2625-2636
-
-
Bianchi, G.1
Capossele, A.T.2
Petrioli, C.3
Spenza, D.4
-
9
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. Journal of Cryptology, 17(4):297-319, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
10
-
-
84953734198
-
Security as a CoAP resource: An optimized DTLS implementation for the IoT
-
London, UK, June
-
A. T. Capossele, V. Cervo, G. De Cicco, and C. Petrioli. Security as a CoAP resource: an optimized DTLS implementation for the IoT. In Proceedings of IEEE ICC 2015, London, UK, June 2015.
-
(2015)
Proceedings of IEEE ICC 2015
-
-
Capossele, A.T.1
Cervo, V.2
De Cicco, G.3
Petrioli, C.4
-
11
-
-
84870536662
-
A secure communication suite for underwater acoustic sensor networks
-
G. Dini and A. Lo Duca. A secure communication suite for underwater acoustic sensor networks. Sensors, 12(11):15133-15158, 2012.
-
(2012)
Sensors
, vol.12
, Issue.11
, pp. 15133-15158
-
-
Dini, G.1
Lo Duca, A.2
-
12
-
-
84861968093
-
Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network
-
Sept.
-
G. Dini and A. Lo Duca. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Networks, 10(7):1167-1178, Sept. 2012.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1167-1178
-
-
Dini, G.1
Lo Duca, A.2
-
13
-
-
79951919857
-
Securing underwater wireless communication networks
-
M. C. Domingo. Securing underwater wireless communication networks. IEEE Wireless Communications, 18(1):22-28, 2011.
-
(2011)
IEEE Wireless Communications
, vol.18
, Issue.1
, pp. 22-28
-
-
Domingo, M.C.1
-
14
-
-
84855645705
-
Jamming-resistant multi-path routing for reliable intruder detection in underwater networks
-
New York, NY, USA
-
M. Goetz, S. Azad, P. Casari, I. Nissen, and M. Zorzi. Jamming-resistant Multi-path Routing for Reliable Intruder Detection in Underwater Networks. In Proceedings of ACM WUWNet '11, pages 10:1-10:5, New York, NY, USA, 2011.
-
(2011)
Proceedings of ACM WUWNet '11
, pp. 101-105
-
-
Goetz, M.1
Azad, S.2
Casari, P.3
Nissen, I.4
Zorzi, M.5
-
15
-
-
84855482959
-
Underwater sensor networks: Applications, advances and challenges
-
J. Heidemann, M. Stojanovic, and M. Zorzi. Underwater sensor networks: applications, advances and challenges. Philosophical Transactions of the Royal Society A, 370(1958):158-175, 2012.
-
(2012)
Philosophical Transactions of the Royal Society A
, vol.370
, Issue.1958
, pp. 158-175
-
-
Heidemann, J.1
Stojanovic, M.2
Zorzi, M.3
-
16
-
-
79961215864
-
Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes
-
April
-
J. Jebadurai, A. Melvin, and I. Jebadurai. Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes. In Proceedings of ICECT 2011, volume 3, pages 321-324, April 2011.
-
(2011)
Proceedings of ICECT 2011
, vol.3
, pp. 321-324
-
-
Jebadurai, J.1
Melvin, A.2
Jebadurai, I.3
-
17
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Springer Berlin Heidelberg
-
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos. Intrusion detection of sinkhole attacks in wireless sensor networks. In Algorithmic Aspects of Wireless Sensor Networks, volume 4837, pages 150-161. Springer Berlin Heidelberg, 2008.
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks
, vol.4837
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
19
-
-
84891703506
-
A multi-band noise-aware mac protocol for underwater acoustic sensor networks
-
Lyon, France, October
-
L. Pescosolido, C. Petrioli, and L. Picari. A multi-band noise-aware mac protocol for underwater acoustic sensor networks. In Proceedings of IEEE WiMob 2013, Lyon, France, October 2013.
-
(2013)
Proceedings of IEEE WiMob 2013
-
-
Pescosolido, L.1
Petrioli, C.2
Picari, L.3
-
20
-
-
84955708976
-
The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks
-
August
-
C. Petrioli, R. Petroccia, J. R. Potter, and D. Spaccini. The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks, Available on-line, August 2014.
-
(2014)
Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks
-
-
Petrioli, C.1
Petroccia, R.2
Potter, J.R.3
Spaccini, D.4
-
21
-
-
70350093428
-
A comparative performance evaluation of MAC protocols for underwater sensor networks
-
Quebec City, Canada, September 15-18
-
C. Petrioli, R. Petroccia, and M. Stojanovic. A Comparative Performance Evaluation of MAC Protocols for Underwater Sensor Networks. In Proceedings of MTS/IEEE OCEANS 2008, Quebec City, Canada, September 15-18 2008.
-
(2008)
Proceedings of MTS/IEEE OCEANS 2008
-
-
Petrioli, C.1
Petroccia, R.2
Stojanovic, M.3
-
22
-
-
84958725997
-
Key management protocol with implicit certificates for IoT systems
-
Florence, Italy, May 18
-
S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi. Key Management Protocol with Implicit Certificates for IoT Systems. In Proceedings of ACM MobiSys 2015 workshop: IoT-Sys 2015, Florence, Italy, May 18 2015.
-
(2015)
Proceedings of ACM MobiSys 2015 Workshop: IoT-Sys 2015
-
-
Sciancalepore, S.1
Capossele, A.2
Piro, G.3
Boggia, G.4
Bianchi, G.5
-
23
-
-
84893452953
-
Performance evaluation of forwarding protocols for the RACUN network
-
New York, NY, USA
-
C. Tapparello, P. Casari, G. Toso, I. Calabrese, R. Otnes, P. van Walree, M. Goetz, I. Nissen, and M. Zorzi. Performance Evaluation of Forwarding Protocols for the RACUN Network. In Proceedings of ACM WUWNet '13, pages 36:1-36:8, New York, NY, USA, 2013.
-
(2013)
Proceedings of ACM WUWNet '13
, pp. 361-368
-
-
Tapparello, C.1
Casari, P.2
Toso, G.3
Calabrese, I.4
Otnes, R.5
Van Walree, P.6
Goetz, M.7
Nissen, I.8
Zorzi, M.9
-
24
-
-
84920277840
-
Attack resilient underwater networks through software defined networking
-
New York, NY, USA
-
G. Toso, D. Munaretto, M. Conti, and M. Zorzi. Attack Resilient Underwater Networks Through Software Defined Networking. In Proceedings of ACM WUWNet '14, pages 44:1-44:2, New York, NY, USA, 2014.
-
(2014)
Proceedings of ACM WUWNet '14
, pp. 441-442
-
-
Toso, G.1
Munaretto, D.2
Conti, M.3
Zorzi, M.4
-
26
-
-
84899740998
-
Visualisation of wormholes in underwater sensor networks: A distributed approach
-
W. Wang, J. Kong, B. Bhargava, and M. Gerla. Visualisation of wormholes in underwater sensor networks: a distributed approach. International Journal of Security and Networks, 3(1):10-23, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 10-23
-
-
Wang, W.1
Kong, J.2
Bhargava, B.3
Gerla, M.4
-
27
-
-
77953299515
-
Wormhole-resilient secure neighbor discovery in underwater acoustic networks
-
March
-
R. Zhang and Y. Zhang. Wormhole-resilient secure neighbor discovery in underwater acoustic networks. In Proceedings of IEEE INFOCOM 2010, pages 1-9, March 2010.
-
(2010)
Proceedings of IEEE INFOCOM 2010
, pp. 1-9
-
-
Zhang, R.1
Zhang, Y.2
|