-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
84939793628
-
Trust-aware and low energy consumption security topology protocol of wireless sensor network
-
Z. Chen, M. He, W. Liang, and K. Chen, "Trust-aware and low energy consumption security topology protocol of wireless sensor network," Journal of Sensors, vol. 2015,Article ID716468, 10 pages, 2015.
-
(2015)
Journal of Sensors
, vol.2015
-
-
Chen, Z.1
He, M.2
Liang, W.3
Chen, K.4
-
3
-
-
84930432851
-
Key pre-distribution scheme forWSNs
-
S. Verma and Prachi, "Key pre-distribution scheme forWSNs," Ad-Hoc and SensorWireless Networks, vol. 23, no. 1-2, pp. 47-67, 2014.
-
(2014)
Ad-Hoc and SensorWireless Networks
, vol.23
, Issue.1-2
, pp. 47-67
-
-
Verma, S.1
Prachi2
-
4
-
-
84930068210
-
A new key predistribution scheme for grid-group deployment of wireless sensor networks
-
S. Bag, "A new key predistribution scheme for grid-group deployment of wireless sensor networks," Ad Hoc and Sensor Wireless Networks, vol. 27, no. 3-4, pp. 313-329, 2015.
-
(2015)
Ad Hoc and Sensor Wireless Networks
, vol.27
, Issue.3-4
, pp. 313-329
-
-
Bag, S.1
-
5
-
-
33646918277
-
Dynamic key management in sensor networks
-
M. Eltoweissy, M. Moharrum, and R. Mukkamala, "Dynamic key management in sensor networks," IEEE Communications Magazine, vol. 44, no. 4, pp. 122-130, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 122-130
-
-
Eltoweissy, M.1
Moharrum, M.2
Mukkamala, R.3
-
6
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
7
-
-
55949107536
-
Reducing radio energy consumption of key management protocols for wireless sensor networks
-
Newport Beach, Calif, USA
-
B. C. Lai, D. D. Hwang, S. P. Kim, and I. Verbauwhede, "Reducing radio energy consumption of key management protocols for wireless sensor networks," in Proceedings of the ACM International Symposium on Low Power Electronics and Design (ISLPED '04), pp. 351-356, Newport Beach, Calif, USA, 2004.
-
(2004)
Proceedings of the ACM International Symposium on Low Power Electronics and Design (ISLPED '04)
, pp. 351-356
-
-
Lai, B.C.1
Hwang, D.D.2
Kim, S.P.3
Verbauwhede, I.4
-
8
-
-
79952574261
-
A light-weight authentication scheme for wireless sensor networks
-
O. D. Mohatar, A. F. Sabater, and J. M. Sierra, "A light-weight authentication scheme for wireless sensor networks," Ad Hoc Networks, vol. 9, no. 5, pp. 727-735, 2011.
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.5
, pp. 727-735
-
-
Mohatar, O.D.1
Sabater, A.F.2
Sierra, J.M.3
-
9
-
-
84928666537
-
Trust management system in wireless sensor networks: Design considerations and research challenges
-
F. Ishmanov, A. S. Malik, S. W. Kim, and B. Begalov, "Trust management system in wireless sensor networks: design considerations and research challenges," Transactions on Emerging Telecommunications Technologies, vol. 26, no. 2, pp. 107-130, 2015.
-
(2015)
Transactions on Emerging Telecommunications Technologies
, vol.26
, Issue.2
, pp. 107-130
-
-
Ishmanov, F.1
Malik, A.S.2
Kim, S.W.3
Begalov, B.4
-
10
-
-
84959499960
-
Wireless physical-layer security: Lessons learned from information theory
-
A. Yener and S. Ulukus, "Wireless physical-layer security: lessons learned from information theory," Proceedings of the IEEE, vol. 103, no. 10, pp. 1814-1825, 2015.
-
(2015)
Proceedings of the IEEE
, vol.103
, Issue.10
, pp. 1814-1825
-
-
Yener, A.1
Ulukus, S.2
-
11
-
-
39549092651
-
Distributed framework for correlated data gathering in sensor networks
-
J. Rabaey and J. Ammer, "Distributed framework for correlated data gathering in sensor networks," IEEE Transactions onMobile Computing, vol. 57, no. 1, pp. 578-593, 2010.
-
(2010)
IEEE Transactions OnMobile Computing
, vol.57
, Issue.1
, pp. 578-593
-
-
Rabaey, J.1
Ammer, J.2
-
12
-
-
84879603362
-
Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: A simulation-based approach
-
K. C. Egemen, B.Dan, andD. Amit, "Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach," Telecommunication Systems, vol. 2, no. 6, pp. 751-768, 2013.
-
(2013)
Telecommunication Systems
, vol.2
, Issue.6
, pp. 751-768
-
-
Egemen, K.C.1
Dan, B.2
Amit, D.3
-
13
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
14
-
-
84860890105
-
A survey on MAC protocols for wireless adhoc networks with beamforming antennas
-
O. Bazan and M. Jaseemuddin, "A survey on MAC protocols for wireless adhoc networks with beamforming antennas," IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 216-239, 2012.
-
(2012)
IEEE Communications Surveys and Tutorials
, vol.14
, Issue.2
, pp. 216-239
-
-
Bazan, O.1
Jaseemuddin, M.2
-
15
-
-
55149121202
-
Research on key technologies for implementing network security situation awareness
-
H.Wang, J. Lai, M.Hu, andY. Liang, "Research on key technologies for implementing network security situation awareness," Geomatics and Information Science ofWuhan University, vol. 33, no. 10, pp. 995-998, 2008.
-
(2008)
Geomatics and Information Science OfWuhan University
, vol.33
, Issue.10
, pp. 995-998
-
-
Wang, H.1
Lai, J.2
Hu, M.3
Liang, Y.4
-
16
-
-
84883698532
-
On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
-
P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1728-1740, 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.9
, pp. 1728-1740
-
-
Lin, P.-H.1
Lai, S.-H.2
Lin, S.-C.3
Su, H.-J.4
-
17
-
-
79251600299
-
A survey on cross-layer solutions for wireless sensor networks
-
D. Lucas and J. Joel, "A survey on cross-layer solutions for wireless sensor networks," IEICE Transaction on Journal of Network and Computer Applications, vol. 5, no. 34, pp. 523-534, 2011.
-
(2011)
IEICE Transaction on Journal of Network and Computer Applications
, vol.5
, Issue.34
, pp. 523-534
-
-
Lucas, D.1
Joel, J.2
-
18
-
-
77649222131
-
The research of the promotion for ECDSA algorithm based on Montgomery-form ECC
-
C. Wang, X.-Y. Shi, and Z.-H. Niu, "The research of the promotion for ECDSA algorithm based on Montgomery-form ECC," Journal on Communications, vol. 31, no. 1, pp. 9-13, 2010.
-
(2010)
Journal on Communications
, vol.31
, Issue.1
, pp. 9-13
-
-
Wang, C.1
Shi, X.-Y.2
Niu, Z.-H.3
-
19
-
-
0036454692
-
A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery formand analysis of efficiency for elliptic curve cryptosystems
-
K. Okeya and K. Sakurai, "A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery formand analysis of efficiency for elliptic curve cryptosystems," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 85, no. 1, pp. 84-93, 2002.
-
(2002)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.85
, Issue.1
, pp. 84-93
-
-
Okeya, K.1
Sakurai, K.2
-
20
-
-
55849149470
-
Data collection in sensor networks with data mules: An intergrade simulation analysis
-
G. Anastasi and M. Conti, "Data collection in sensor networks with data mules: an intergrade simulation analysis," IEEE Symposium on Computers and Communications, vol. 3, no. 7, pp. 1096-1102, 2012.
-
(2012)
IEEE Symposium on Computers and Communications
, vol.3
, Issue.7
, pp. 1096-1102
-
-
Anastasi, G.1
Conti, M.2
|