The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Security of ad hoc and Sensor Networks (sasn)
2006 (conf/sasn/2006)

  1. Shu Chen, Yu Zhang, Wade Trappe
    Inverting sensor networks and actuating the environment for spatio-temporal access control. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:1-12 [Conf]
  2. Xiaoxin Wu, Ninghui Li
    Achieving privacy in mesh networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:13-22 [Conf]
  3. Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas
    Robust cooperative trust establishment for MANETs. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:23-34 [Conf]
  4. Anthony D. Wood, Lei Fang, John A. Stankovic, Tian He
    SIGF: a family of configurable, secure routing protocols for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:35-48 [Conf]
  5. Gergely Ács, Levente Buttyán, István Vajda
    Modelling adversaries and security objectives for routing protocols in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:49-58 [Conf]
  6. Suk-Bok Lee, Yoon-Hwa Choi
    A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:59-70 [Conf]
  7. Sankardas Roy, Sanjeev Setia, Sushil Jajodia
    Attack-resilient hierarchical data aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:71-82 [Conf]
  8. Levente Buttyán, Péter Schaffer, István Vajda
    RANBAR: RANSAC-based resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:83-90 [Conf]
  9. Mahdi Kefayati, Hamid R. Rabiee, Seyed Ghassem Miremadi, Ahmad Khonsari
    Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:91-100 [Conf]
  10. Abdulrahman Alarifi, Wenliang Du
    Diversify sensor nodes to improve resilience against node compromise. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:101-112 [Conf]
  11. Mario Strasser, Harald Vogt
    Autonomous and distributed node recovery in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:113-122 [Conf]
  12. Yongjin Kim, Ahmed Helmy
    Attacker traceback with cross-layer monitoring in wireless multi-hop networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:123-134 [Conf]
  13. Svetlana Radosavac, John S. Baras, George V. Moustakides
    Impact of optimal MAC layer attacks on the network layer. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:135-146 [Conf]
  14. Mark Luk, Adrian Perrig, Bram Whillock
    Seven cardinal properties of sensor network broadcast authentication. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:147-156 [Conf]
  15. Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean Wang
    Location-aware key predistribution scheme for wide area wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:157-168 [Conf]
  16. Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter
    How public key cryptography influences wireless sensor node lifetime. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:169-176 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002