Don't Sweat Your Privacy Using Humidity to Detect Human Presence
暂无分享,去创建一个
[1] Liang Zhang,et al. Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[2] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[3] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[4] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[5] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[6] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[9] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[10] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[11] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[12] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[13] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[14] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..