A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Towards a Lightweight Security Solution for User-Friendly Management of Distributed Sensor Networks
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Design of authentication protocol for LR-WPAN using pre-authentication mechanism
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
Computer Communications
SM-Sens: security middleware for wireless sensor networks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks
International Journal of Autonomous and Adaptive Communications Systems
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Noninteractive pairwise key establishment for sensor networks
IEEE Transactions on Information Forensics and Security
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Maximizing lifetime of event-unobservable wireless sensor networks
Computer Standards & Interfaces
A review on body area networks security for healthcare
ISRN Communications and Networking
Secure route selection in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient pairwise key establishment scheme based on random pre-distribution keys in WSN
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
Journal of Medical Systems
Framework for key management scheme in heterogeneous wireless sensor networks
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Optimization schemes for protective jamming
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Expert Systems with Applications: An International Journal
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
Security and Communication Networks
Survey Secure and reliable clustering in wireless sensor networks: A critical survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile Networks and Applications
Modeling access control for cyber-physical systems using reputation
Computers and Electrical Engineering
Fine tuning the advanced encryption standard (AES)
Proceedings of the Fifth International Conference on Security of Information and Networks
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
Denial of service mitigation approach for IPv6-enabled smart object networks
Concurrency and Computation: Practice & Experience
A hash chains based key management scheme for wireless sensor networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Lightweight energy consumption based intrusion detection system for wireless sensor networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes
Proceedings of the first ACM workshop on Asia public-key cryptography
Improving security in data-centric storage for wireless sensor networks
Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks
Fine-grained analysis of packet loss symptoms in wireless sensor networks
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
The optimal generalized Byzantine Agreement in Cluster-based Wireless Sensor Networks
Computer Standards & Interfaces
Hi-index | 0.00 |
First Page of the Article