A Scalable Solution for Securing Wireless Sensor Networks
暂无分享,去创建一个
Stephan Olariu | Mohamed Eltoweissy | Kennie H. Jones | Larry Wilson | Ashraf Wadaa | S. Olariu | M. Eltoweissy | K. Jones | A. Wadaa | L. Wilson
[1] Fan Hong,et al. Intrusion Detection in Ad-hoc Networks , 2006 .
[2] Stephan Olariu,et al. Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.
[3] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[5] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[6] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[7] Paramvir Bahl,et al. PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.
[8] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[9] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[10] Gabor Karsai,et al. Smart Dust: communicating with a cubic-millimeter computer , 2001 .
[11] V.V. Zhirnov,et al. New Frontiers: Self-Assembly and Nanoelectronics , 2001, Computer.
[12] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[13] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[14] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[15] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[16] Jaap C. Haartsen,et al. The Bluetooth radio system , 2000, IEEE Personal Communications.
[17] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[18] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[19] Birgit Pfitzmann,et al. Trusting Mobile User Devices and Security Modules , 1997, Computer.
[20] Paul Saffo,et al. Sensors: the next wave of innovation , 1997, CACM.
[21] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[22] A. Ephremides,et al. A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.