A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Diversify sensor nodes to improve resilience against node compromise
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Autonomous and distributed node recovery in wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Sensor node compromise detection: the location perspective
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Movement-assisted sensor redeployment scheme for network lifetime increase
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
On securing perimeter coverage in wireless sensor networks
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Hi-index | 0.00 |