Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Untraceable mobility or how to travel incognito
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Project “anonymity and unobservability in the Internet”
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
On the impact of alternate path routing for load balancing in mobile ad hoc networks
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SPINS: security protocols for sensor networks
Wireless Networks
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Differentiated surveillance for sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Methods for Scalable Self-Assembly of Ad Hoc Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Training a wireless sensor network
Mobile Networks and Applications
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
PAWNs: Satisfying the need for ubiquitos secure connectivity and location services
IEEE Wireless Communications
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Wireless sensor networks: leveraging the virtual infrastructure
IEEE Network: The Magazine of Global Internetworking
Multi-training sensor networks with bipartite conflict graphs
Proceedings of the international workshop on Middleware for sensor networks
Anonymous topology discovery for multihop wireless sensor networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Designing a secure reliable file system for sensor networks
Proceedings of the 2007 ACM workshop on Storage security and survivability
International Journal of Autonomous and Adaptive Communications Systems
Location privacy and anonymity preserving routing for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards trustworthy shared networked sensor-actuator systems
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
On asynchronous training in sensor networks
Journal of Mobile Multimedia
Protecting anonymity in wireless medical monitoring environments
Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The main contribution of this work is to propose a new concept: the AutoNomouS Wireless sEnsor netwoRk (ANSWER) whose mission is to provide in-situ users with secure information that enhances their context awareness. ANSWER finds immediate applications to both overt and covert operations ranging from tactical battlefield surveillance to crisis management and homeland security. ANSWER is capable of performing sophisticated analyses for detecting trends and identifying unexpected, coherent, and emergent behavior.