-
2
-
-
84893245457
-
Cache privacy in named-data networking
-
IEEE
-
G. Acs, M. Conti, P. Gasti, C. Ghali, and G. Tsudik. Cache privacy in named-data networking. In ICDCS, pages 41-51. IEEE, 2013.
-
(2013)
ICDCS
, pp. 41-51
-
-
Acs, G.1
Conti, M.2
Gasti, P.3
Ghali, C.4
Tsudik, G.5
-
3
-
-
84906972210
-
Named data networking for IoT: An architectural perspective
-
IEEE
-
M. Amadeo, C. Campolo, A. Iera, and A. Molinaro. Named data networking for IoT: An architectural perspective. In EuCNC, pages 1-5. IEEE, 2014.
-
(2014)
EuCNC
, pp. 1-5
-
-
Amadeo, M.1
Campolo, C.2
Iera, A.3
Molinaro, A.4
-
4
-
-
84988250067
-
Internet of things via named data networking: The support of push traffic
-
IEEE
-
M. Amadeo, C. Campolo, and A. Molinaro. Internet of Things via Named Data Networking: The support of push traffic. In NOF, pages 1-5. IEEE, 2014.
-
(2014)
NOF
, pp. 1-5
-
-
Amadeo, M.1
Campolo, C.2
Molinaro, A.3
-
5
-
-
84942303394
-
Information centric networking in the iot: Experiments with ndn in the wild
-
ACM
-
E. Baccelli, C. Mehlis, O. Hahm, T. C. Schmidt, and M. Wählisch. Information Centric Networking in the IoT: Experiments with NDN in the Wild. In ICN, pages 77-86. ACM, 2014.
-
(2014)
ICN
, pp. 77-86
-
-
Baccelli, E.1
Mehlis, C.2
Hahm, O.3
Schmidt, T.C.4
Wählisch, M.5
-
6
-
-
84945119254
-
Entity authentication and key distribution
-
Springer
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO, pages 232-249. Springer, 1994.
-
(1994)
CRYPTO
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
62149118079
-
The eap-psk protocol: A pre-shared key extensible authentication protocol (eap) method
-
F. Bersani and H. Tschofenig. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method. RFC 4764.
-
RFC 4764
-
-
Bersani, F.1
Tschofenig, H.2
-
8
-
-
84969335220
-
Securing instrumented environments over content-centric networking: The case of lighting control and NDN
-
IEEE
-
J. Burke, P. Gasti, N. Nathan, and G. Tsudik. Securing instrumented environments over content-centric networking: the case of lighting control and NDN. In INFOCOM Workshops, pages 394-398. IEEE, 2013.
-
(2013)
INFOCOM Workshops
, pp. 394-398
-
-
Burke, J.1
Gasti, P.2
Nathan, N.3
Tsudik, G.4
-
9
-
-
84911032385
-
Secure sensing over named data networking
-
IEEE
-
J. Burke, P. Gasti, N. Nathan, and G. Tsudik. Secure Sensing over Named Data Networking. In NCA, pages 175-180. IEEE, 2014.
-
(2014)
NCA
, pp. 175-180
-
-
Burke, J.1
Gasti, P.2
Nathan, N.3
Tsudik, G.4
-
10
-
-
0010461175
-
Constraints and approaches for distributed sensor network security (final)
-
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security (final). DARPA Project report,(Cryptographic Technologies Group, Trusted Information System, NAI Labs), 1(1), 2000.
-
(2000)
DARPA Project Report(Cryptographic Technologies Group Trusted Information System NAI Labs)
, vol.1
, pp. 1
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
11
-
-
77956994208
-
Recommendation for key derivation using pseudorandom functions
-
L. Chen. Recommendation for key derivation using pseudorandom functions. NIST special publication, 800:108, 2008.
-
(2008)
NIST Special Publication, 800
, pp. 108
-
-
Chen, L.1
-
12
-
-
84955247359
-
Violating consumer anonymity: Geo-locating nodes in named data networking
-
Springer
-
A. Compagno, M. Conti, P. Gasti, L. V. Mancini, and G. Tsudik. Violating consumer anonymity: Geo-locating nodes in named data networking. In ACNS, pages 243-262. Springer, 2015.
-
(2015)
ACNS
, pp. 243-262
-
-
Compagno, A.1
Conti, M.2
Gasti, P.3
Mancini, L.V.4
Tsudik, G.5
-
13
-
-
84898024191
-
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
-
IEEE
-
A. Compagno, M. Conti, P. Gasti, and G. Tsudik. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In LCN, pages 630-638. IEEE, 2013.
-
(2013)
LCN
, pp. 630-638
-
-
Compagno, A.1
Conti, M.2
Gasti, P.3
Tsudik, G.4
-
15
-
-
84994078831
-
Secure cooperative channel establishment in wireless sensor networks
-
IEEE
-
M. Conti, R. Di Pietro, and L. V. Mancini. Secure cooperative channel establishment in wireless sensor networks. In PerCom Workshops, pages 5-9. IEEE, 2006.
-
(2006)
PerCom Workshops
, pp. 5-9
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
-
16
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
IEEE
-
G. De Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira. On the energy cost of communication and cryptography in wireless sensor networks. In WiMob, pages 580-585. IEEE, 2008.
-
(2008)
WiMob
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
17
-
-
0003216023
-
Internet protocol version 6 (ipv6) specification
-
S. E. Deering. Internet Protocol, Version 6 (IPv6) Specification. RFC 2460.
-
RFC 2460
-
-
Deering, S.E.1
-
18
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
ACM
-
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS, pages 41-47. ACM, 2002.
-
(2002)
CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
20
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
ACM
-
C. Karlof, N. Sastry, and D. Wagner. TinySec: a link layer security architecture for wireless sensor networks. In SenSys, pages 162-175. ACM, 2004.
-
(2004)
SenSys
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
22
-
-
78049298573
-
The price of security in wireless sensor networks
-
J. Lee, K. Kapitanova, and S. H. Son. The price of security in wireless sensor networks. Computer Networks, 54(17):2967-2978, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.17
, pp. 2967-2978
-
-
Lee, J.1
Kapitanova, K.2
Son, S.H.3
-
23
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. TISSEC, 8(1):41-77, 2005.
-
(2005)
TISSEC
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
26
-
-
0036738266
-
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. SPINS: Security protocols for sensor networks. Wireless networks, 8(5):521-534, 2002.
-
(2002)
SPINS: Security Protocols for Sensor Networks. Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
27
-
-
84887348851
-
Panatiki: A network access control implementation based on PANA for IoT devices
-
P. M. Sanchez, R. M. Lopez, and A. F. G. Skarmeta. Panatiki: A network access control implementation based on PANA for IoT devices. Sensors, 13(11):14888-14917, 2013.
-
(2013)
Sensors
, vol.13
, Issue.11
, pp. 14888-14917
-
-
Sanchez, P.M.1
Lopez, R.M.2
Skarmeta, A.F.G.3
-
28
-
-
84903593560
-
Securing building management systems using named data networking
-
W. Shang, Q. Ding, A. Marianantoni, J. Burke, and L. Zhang. Securing building management systems using named data networking. Network, 28(3):50-56, 2014.
-
(2014)
Network
, vol.28
, Issue.3
, pp. 50-56
-
-
Shang, W.1
Ding, Q.2
Marianantoni, A.3
Burke, J.4
Zhang, L.5
-
31
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer, 35(10):54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
33
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN, 2(4):500-528, 2006.
-
(2006)
TOSN
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|