|
Conferences in DBLP
- Shu Chen, Yu Zhang, Wade Trappe
Inverting sensor networks and actuating the environment for spatio-temporal access control. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:1-12 [Conf]
- Xiaoxin Wu, Ninghui Li
Achieving privacy in mesh networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:13-22 [Conf]
- Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas
Robust cooperative trust establishment for MANETs. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:23-34 [Conf]
- Anthony D. Wood, Lei Fang, John A. Stankovic, Tian He
SIGF: a family of configurable, secure routing protocols for wireless sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:35-48 [Conf]
- Gergely Ács, Levente Buttyán, István Vajda
Modelling adversaries and security objectives for routing protocols in wireless sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:49-58 [Conf]
- Suk-Bok Lee, Yoon-Hwa Choi
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:59-70 [Conf]
- Sankardas Roy, Sanjeev Setia, Sushil Jajodia
Attack-resilient hierarchical data aggregation in sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:71-82 [Conf]
- Levente Buttyán, Péter Schaffer, István Vajda
RANBAR: RANSAC-based resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:83-90 [Conf]
- Mahdi Kefayati, Hamid R. Rabiee, Seyed Ghassem Miremadi, Ahmad Khonsari
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:91-100 [Conf]
- Abdulrahman Alarifi, Wenliang Du
Diversify sensor nodes to improve resilience against node compromise. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:101-112 [Conf]
- Mario Strasser, Harald Vogt
Autonomous and distributed node recovery in wireless sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:113-122 [Conf]
- Yongjin Kim, Ahmed Helmy
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:123-134 [Conf]
- Svetlana Radosavac, John S. Baras, George V. Moustakides
Impact of optimal MAC layer attacks on the network layer. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:135-146 [Conf]
- Mark Luk, Adrian Perrig, Bram Whillock
Seven cardinal properties of sensor network broadcast authentication. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:147-156 [Conf]
- Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean Wang
Location-aware key predistribution scheme for wide area wireless sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:157-168 [Conf]
- Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter
How public key cryptography influences wireless sensor node lifetime. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:169-176 [Conf]
|