Creating a secure index for distributed data on the sensor network
暂无分享,去创建一个
C. P. Katti | Prem Chandra Saxena | Chittaranjan Padmanabha Katti | Vandana Bhasin | P. Saxena | Vandana Bhasin
[1] Felix C. Freiling,et al. Attacker Models for Wireless Sensor Networks , 2010, it Inf. Technol..
[2] Jie Gao,et al. Double Rulings for Information Brokerage in Sensor Networks , 2006, IEEE/ACM Transactions on Networking.
[3] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[4] Ivan Stojmenovic,et al. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.
[5] Laurence T. Yang,et al. Scalable and efficient key management for heterogeneous sensor networks , 2008, The Journal of Supercomputing.
[6] Ivan Stojmenovic,et al. Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks , 2009, IEEE Transactions on Computers.
[7] Lek Heng Ngoh,et al. An efficient resiliency scheme for data centric storage in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[8] Kuei-Ping Shih,et al. A grid-based dynamic load balancing approach for data-centric storage in wireless sensor networks , 2010, Comput. Electr. Eng..
[9] Deborah Estrin,et al. Data-centric storage in sensornets , 2003, CCRV.
[10] Jianying Zhou,et al. Wireless Sensor Networks Security , 2008 .
[11] Stefano Chessa,et al. Q-NiGHT: Adding QoS to Data Centric Storage in Non-Uniform Sensor Networks , 2007, 2007 International Conference on Mobile Data Management.
[12] Robert W. Brennan,et al. A Comparison of Alternative Distributed Dynamic Cluster Formation Techniques for Industrial Wireless Sensor Networks , 2016, Sensors.
[13] Rabie A. Ramadan,et al. Smart Environmental Monitoring Using Wireless Sensor Networks , 2013 .
[14] Jens Grossklags,et al. Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks , 2003, Mobile Data Management.
[15] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[16] Slawomir Wesolkowski,et al. A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks , 2016, Recent Advances in Computational Intelligence in Defense and Security.
[17] Dong Xuan,et al. A dynamic geographic hash table for data-centric storage in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[18] Daniel Curiac,et al. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges , 2016, Sensors.
[19] Peter Desnoyers,et al. TSAR: a two tier sensor storage architecture using interval skip graphs , 2005, SenSys '05.
[20] João Barros,et al. A Network Coding Approach to Secret Key Distribution , 2008, IEEE Transactions on Information Forensics and Security.
[21] Deborah Estrin,et al. GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.
[22] Subhash C. Kak,et al. A Distributed Data Storage Scheme for Sensor Networks , 2009, MobiSec.
[23] Ivan Stojmenovic,et al. Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks , 2007, UIC.
[24] Dandan Liu,et al. A Scalable Quorum Based Location Service in Ad Hoc and Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[25] Ivan Stojmenovic,et al. A scalable quorum-based location service in ad hoc and sensor networks , 2008 .