-
1
-
-
33750324672
-
Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks
-
Deng, J., Han, R., Mishra, S., Efficiently authenticating code images in dynamically reprogrammed wireless sensor networks. Proceedings of the IEEE Third International Workshop on Pervasive Computing and Communication Security, Pisa, Italy, 2006, 272–276.
-
(2006)
Proceedings of the IEEE Third International Workshop on Pervasive Computing and Communication Security, Pisa, Italy
, pp. 272-276
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
2
-
-
34247397108
-
Secure code distribution in dynamically programmable wireless sensor networks
-
Deng, J., Han, R., Mishra, S., Secure code distribution in dynamically programmable wireless sensor networks. Proceedings of the Fifth International Conference on Information Processing in Sensor Networks,Nashville, TN, USA, 2006, 292–300.
-
(2006)
Proceedings of the Fifth International Conference on Information Processing in Sensor Networks,Nashville, TN, USA
, pp. 292-300
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
3
-
-
56749151138
-
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks
-
Dong, Q., Liu, D.G., Ning, P., Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. Proceedings of the First ACM Conference on Wireless Network Security, New York, NY, USA, 2008, 2–13.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security, New York, NY, USA
, pp. 2-13
-
-
Dong, Q.1
Liu, D.G.2
Ning, P.3
-
4
-
-
34247376029
-
Securing the deluge network programming system
-
Dutta, P.K., Hui, J.W., Chu, D.C., Culler, D.E., Securing the deluge network programming system. Proceedings of the of the Fifth International Conference on Information Processing in Sensor networks, Nashville, TN, USA, 2006, 326–333.
-
(2006)
Proceedings of the of the Fifth International Conference on Information Processing in Sensor networks, Nashville, TN, USA
, pp. 326-333
-
-
Dutta, P.K.1
Hui, J.W.2
Chu, D.C.3
Culler, D.E.4
-
5
-
-
84861438303
-
DiCode: dos-resistant and distributed code dissemination in wireless sensor networks
-
He, D.J., Chen, C., Chan, S., Bu, J.J., DiCode: dos-resistant and distributed code dissemination in wireless sensor networks. IEEE Trans. Wirel. Commun. 11:5 (2012), 1946–1956.
-
(2012)
IEEE Trans. Wirel. Commun.
, vol.11
, Issue.5
, pp. 1946-1956
-
-
He, D.J.1
Chen, C.2
Chan, S.3
Bu, J.J.4
-
6
-
-
84861445209
-
SDRP: a secure and distributed reprogramming protocol for wireless sensor networks
-
He, D.J., Chen, C., Chan, S., Bu, J.J., SDRP: a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 59:11 (2012), 4155–4163.
-
(2012)
IEEE Trans. Ind. Electron.
, vol.59
, Issue.11
, pp. 4155-4163
-
-
He, D.J.1
Chen, C.2
Chan, S.3
Bu, J.J.4
-
7
-
-
84879121354
-
Security analysis and improvement of a secure and dissemination reprogramming protocol for wireless sensor networks
-
He, D.J., Chen, C., Chan, S., Bu, J.J., Yang, L.T., Security analysis and improvement of a secure and dissemination reprogramming protocol for wireless sensor networks. IEEE Trans. Ind. Electron. 60:7 (2013), 5348–5354.
-
(2013)
IEEE Trans. Ind. Electron.
, vol.60
, Issue.7
, pp. 5348-5354
-
-
He, D.J.1
Chen, C.2
Chan, S.3
Bu, J.J.4
Yang, L.T.5
-
8
-
-
77953769705
-
On optimal information capture by energy-constrained mobile sensors
-
He, S.B., Chen, J.M., Sun, Y.X., et al. On optimal information capture by energy-constrained mobile sensors. IEEE Trans. Veh. Technol. 59:5 (2010), 2472–2484.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.5
, pp. 2472-2484
-
-
He, S.B.1
Chen, J.M.2
Sun, Y.X.3
-
9
-
-
84883351671
-
EMD: energy-efficient P2P message dissemination in delay-tolerant wireless sensor and actor networks
-
He, S.B., Li, X., Chen, J.M., Cheng, P., Sun, Y.X., David, S.R., EMD: energy-efficient P2P message dissemination in delay-tolerant wireless sensor and actor networks. IEEE J. Sel. Areas Commun. 31:9 (2013), 75–84.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 75-84
-
-
He, S.B.1
Li, X.2
Chen, J.M.3
Cheng, P.4
Sun, Y.X.5
David, S.R.6
-
10
-
-
84930864594
-
Universal designated verifier transitive signatures for graph-based big data
-
Hou, S.Q., Huang, X.Y., Liu, J.K., Universal designated verifier transitive signatures for graph-based big data. Inf. Sci. 318 (2015), 144–156.
-
(2015)
Inf. Sci.
, vol.318
, pp. 144-156
-
-
Hou, S.Q.1
Huang, X.Y.2
Liu, J.K.3
-
11
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
Hui, J.W., Culler, D., The dynamic behavior of a data dissemination protocol for network programming at scale. Proceedings of the Second International Conference on Embedded Networked Sensor Systems,Baltimore, MD, USA, 2004, 81–94.
-
(2004)
Proceedings of the Second International Conference on Embedded Networked Sensor Systems,Baltimore, MD, USA
, pp. 81-94
-
-
Hui, J.W.1
Culler, D.2
-
12
-
-
51249093755
-
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
-
Hyun, S.W., Ning, P., Liu, A., Du, W.L., Seluge: Secure and dos-resistant code dissemination in wireless sensor networks. Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, Louis, MO, USA, 2008, 445–456.
-
(2008)
Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, Louis, MO, USA
, pp. 445-456
-
-
Hyun, S.W.1
Ning, P.2
Liu, A.3
Du, W.L.4
-
13
-
-
33947642085
-
Sluice: secure dissemination of code updates in sensor networks
-
Lanigan, P.E., Gandhi, R., Narasimhan, P., Sluice: secure dissemination of code updates in sensor networks. Proceedings of the IEEE International Conference on Distributed Computing Systems, 2006.
-
(2006)
Proceedings of the IEEE International Conference on Distributed Computing Systems
-
-
Lanigan, P.E.1
Gandhi, R.2
Narasimhan, P.3
-
14
-
-
78249233570
-
Secure rateless deluge: pollution-resistant reprogramming and data dissemination for wireless sensor networks
-
Law, Y.W., Zhang, Y., Jin, J., Palaniswami, M., Havinga, P., Secure rateless deluge: pollution-resistant reprogramming and data dissemination for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2011:22 (2011), 1–22.
-
(2011)
EURASIP J. Wirel. Commun. Netw.
, vol.2011
, Issue.22
, pp. 1-22
-
-
Law, Y.W.1
Zhang, Y.2
Jin, J.3
Palaniswami, M.4
Havinga, P.5
-
15
-
-
84937408891
-
GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks.
-
Mihir, B., Adriana, P., GQ and Schnorr identification schemes: proofs of security against impersonation under active and concurrent attacks. Proceedings of the CRYPTO LNCS, 2442, 2002, 162–177.
-
(2002)
Proceedings of the CRYPTO, LNCS
, vol.2442
, pp. 162-177
-
-
Mihir, B.1
Adriana, P.2
-
16
-
-
38049000278
-
Secure dynamic network reprogramming using supplementary hash in wireless sensor networks
-
Park, K., Lee, J.H., Kwon, T.Y., Song, J., Secure dynamic network reprogramming using supplementary hash in wireless sensor networks. Proceedings of the Fourth International Conference on Ubiquitous Intelligence and Computing, Hong Kong, Hong Kong, 2007, 653–662.
-
(2007)
Proceedings of the Fourth International Conference on Ubiquitous Intelligence and Computing, Hong Kong, Hong Kong
, pp. 653-662
-
-
Park, K.1
Lee, J.H.2
Kwon, T.Y.3
Song, J.4
-
17
-
-
0031223146
-
A tutorial on Reed–Solomon coding for fault-tolerance in raid-like systems
-
Plank, J., A tutorial on Reed–Solomon coding for fault-tolerance in raid-like systems. Softw. Pract. Exp. 27:9 (1997), 995–1012.
-
(1997)
Softw. Pract. Exp.
, vol.27
, Issue.9
, pp. 995-1012
-
-
Plank, J.1
-
18
-
-
70349103341
-
A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks
-
Tan, H.L., Ostry, D., Zic, J., Jha, S., A confidential and dos-resistant multi-hop code dissemination protocol for wireless sensor networks. Proceedings of the Second ACM Conference on Wireless Network Security,Zurich, Switzerland, 2009, 245–252.
-
(2009)
Proceedings of the Second ACM Conference on Wireless Network Security,Zurich, Switzerland
, pp. 245-252
-
-
Tan, H.L.1
Ostry, D.2
Zic, J.3
Jha, S.4
-
19
-
-
84874113596
-
Mobile peer-to-peer data dissemination in wireless ad-hoc networks
-
Waluyo, A.B., Taniar, D., Rahayu, W., Mobile peer-to-peer data dissemination in wireless ad-hoc networks. Inf. Sci. 230 (2013), 3–20.
-
(2013)
Inf. Sci.
, vol.230
, pp. 3-20
-
-
Waluyo, A.B.1
Taniar, D.2
Rahayu, W.3
-
20
-
-
80051876961
-
LR-Seluge: loss-resilient and secure code dissemination in wireless sensor networks
-
Zhang, R., Zhang, Y.H., LR-Seluge: loss-resilient and secure code dissemination in wireless sensor networks. Proceedings of the IEEE, Minneapolis, Minnesota, USA, 2011, 497–505.
-
(2011)
Proceedings of the IEEE, Minneapolis, Minnesota, USA
, pp. 497-505
-
-
Zhang, R.1
Zhang, Y.H.2
-
21
-
-
84941918744
-
Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
-
Zhang, Y.M., He, S.B., Chen, J.M., Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. IEEE/ACM Trans. Netw. 24:3 (2016), 1632–1646.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.3
, pp. 1632-1646
-
-
Zhang, Y.M.1
He, S.B.2
Chen, J.M.3
|