The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SASN"( http://dblp.L3S.de/Venues/SASN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sasn

Publication years (Num. hits)
2003 (15) 2004 (15) 2005 (16) 2006 (17)
Publication types (Num. hits)
inproceedings(59) proceedings(4)
Venues (Conferences, Journals, ...)
SASN(63)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 187 occurrences of 104 keywords

Results
Found 63 publication records. Showing 63 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Shu Chen, Yu Zhang, Wade Trappe Inverting sensor networks and actuating the environment for spatio-temporal access control. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, localization
1Gergely Ács, Levente Buttyán, István Vajda Modelling adversaries and security objectives for routing protocols in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, routing protocols, provable security, simulatability, adversary model
1Suk-Bok Lee, Yoon-Hwa Choi A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF packet-dropping attacks, secure routing, sensor network security, reliable delivery
1Sankardas Roy, Sanjeev Setia, Sushil Jajodia Attack-resilient hierarchical data aggregation in sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack-resilient, synopsis diffusion, data aggregation, sensor network security, hierarchical aggregation
1Yongjin Kim, Ahmed Helmy Attacker traceback with cross-layer monitoring in wireless multi-hop networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks
1Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas Robust cooperative trust establishment for MANETs. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF routing, mobile ad hoc networks, trust establishment
1Mark Luk, Adrian Perrig, Bram Whillock Seven cardinal properties of sensor network broadcast authentication. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor network, taxonomy, broadcast authentication
1Xiaoxin Wu 0001, Ninghui Li Achieving privacy in mesh networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, mesh networks
1Mahdi Kefayati, Hamid R. Rabiee, Seyed Ghassem Miremadi, Ahmad Khonsari Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MANET security, misbehavior resiliance, multipath routing
1Svetlana Radosavac, John S. Baras, George V. Moustakides Impact of optimal MAC layer attacks on the network layer. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF minmax robust detection, protocol misbehavior, Ad-hoc networks, cross-layer, MAC layer
1Abdulrahman Alarifi, Wenliang Du Diversify sensor nodes to improve resilience against node compromise. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, reverse engineering, diversity, obfuscation
1Mario Strasser, Harald Vogt Autonomous and distributed node recovery in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF node recovery, sensor networks, intrusion detection, wireless
1Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter How public key cryptography influences wireless sensor node lifetime. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, performance, complexity, cryptography, RSA, elliptic curve cryptography
1Anthony D. Wood, Lei Fang, John A. Stankovic, Tian He 0001 SIGF: a family of configurable, secure routing protocols for wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor network, secure routing
1Sencun Zhu, Donggang Liu (eds.) Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006 Search on Bibsonomy SASN The full citation details ... 2006 DBLP  BibTeX  RDF
1Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean Wang Location-aware key predistribution scheme for wide area wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key predistribution scheme, security, sensor network
1Levente Buttyán, Péter Schaffer, István Vajda RANBAR: RANSAC-based resilient aggregation in sensor networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF outlier elimination, random sample consensus, resilient aggregation, sensor networks
1Shouhuai Xu On the security of group communication schemes based on symmetric key cryptosystems. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF backward-security, security, key management, group communication, broadcast encryption, forward-security
1Vijay Atluri, Peng Ning, Wenliang Du (eds.) Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 Search on Bibsonomy SASN The full citation details ... 2005 DBLP  BibTeX  RDF
1Weichao Wang, Bharat K. Bhargava Key distribution and update for secure inter-group multicast communication. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inter-group communication, key distribution and update, security
1Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas A quantitative trust establishment framework for reliable data packet delivery in MANETs. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF routing, mobile ad hoc networks, trust establishment
1Sindhu Karthikeyan, Mikhail Nesterenko RFID security without extensive cryptography. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, RFID
1Jiejun Kong, Dapeng Wu 0001, Xiaoyan Hong, Mario Gerla Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ANODR, identity-free routing, motion-MIX, mobility, anonymity
1Maxim Raya, Jean-Pierre Hubaux The security of vehicular ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, vehicular ad hoc networks
1Radha Poovendran Information assurance in manets and wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yinian Mao, Min Wu 0001 Coordinated sensor deployment for improving secure communications and sensing coverage. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF location adjustment, secure communications, key pre-distribution, sensor deployment, sensing coverage
1Ronggong Song, Larry Korba, George Yee AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, mobile ad hoc network, anonymity, dynamic source routing
1Michael Manzo, Tanya G. Roosta, Shankar Sastry 0001 Time synchronization attacks in sensor networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF clock drift and skew, security, sensor network, authentication, time-synchronization
1Virgil D. Gligor Advances in sensor and ad-hoc network security: perspective and status. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi Yoneda A key pre-distribution scheme for secure sensor networks using probability density function of node deployment. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
1Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce Improved topology assumptions for threshold cryptography in mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed cryptography, mobile ad hoc networks, threshold cryptography, threshold signatures
1Jing Deng 0002, Richard Han 0001, Shivakant Mishra Defending against path-based DoS attacks in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, sensor networks, denial of services attacks
1Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, clustering, MAC protocols, jamming, denial-of-service attacks
1Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras Detection and prevention of MAC layer misbehavior in ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc networks, intrusion detection, MAC layer
1Sanjeev Setia, Vipin Swarup (eds.) Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004 Search on Bibsonomy SASN The full citation details ... 2004 DBLP  BibTeX  RDF
1Yih-Chun Hu, David B. Johnson 0001 Securing quality-of-service route discovery in on-demand routing for ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SQoS, security, simulations, quality-of-service, ad hoc networks, QoS routing
1Joengmin Hwang, Yongdae Kim Revisiting random key pre-distribution schemes for wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wireless sensor networks, key pre-distribution
1John A. Stankovic Security in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Levente Buttyán, István Vajda Towards provable security for ad hoc routing protocols. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF on-demand source routing, ad hoc networks, routing protocols, provable security, simulatability
1David A. Wagner 0001 Resilient aggregation in sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF node capture attack, sensor networks, aggregation, robust statistics, mean, median, multi-party computation, average
1Ronald J. Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus TinyPK: securing sensor networks with public key technology. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public key (PK), rivest shamir adelman (RSA), sensor networks, authentication, cryptography, encryption, key management, TinyOS, diffie-hellman
1Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems
1Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF qos signaling, security, quality of service, ad hoc networks, denial of service, attacks
1Celal Öztürk, Yanyong Zhang, Wade Trappe Source-location privacy in energy-constrained sensor network routing. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF context privacy, sensor networks privacy, source-location privacy, flooding
1Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan Connectivity properties of secure wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, connectivity, key management, random graphs, probabilistic key sharing
1Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn Location-aware key management scheme for wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
1Daniele Raffo, Cédric Adjih, Thomas H. Clausen, Paul Mühlethaler An advanced signature system for OLSR. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ADVSIG, multiple signatures, proofs, OLSR, proactive, link state
1Saurabh Ganeriwal, Mani B. Srivastava Reputation-based framework for high integrity sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF bayesian formulation, security, sensor networks, cryptography, trust, framework, reputation
1Jing Deng 0002, Richard Han 0001, Shivakant Mishra Security support for in-network processing in Wireless Sensor Networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sensor networks, in-network processing, security mechanisms
1Thomas S. Messerges, Johnas Cukier, Tom A. M. Kevenaar, Larry Puhl, René Struik, Ed Callaway A security design for a general purpose, self-organizing, multihop ad hoc wireless network. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, ad hoc networks, wireless, 802.15.4
1André Weimerskirch, Dirk Westhoff Identity certified authentication for ad-hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key-chains, security, ad-hoc networks, authentication, identification
1Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux SECTOR: secure tracking of node encounters in multi-hop wireless networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, mobility, mobile networks, positioning, security associations
1Claude Crépeau, Carlton R. Davis A certificate revocation scheme for wireless ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF revocation scheme, digital signature, public-key cryptography, ad hoc network security
1Donggang Liu, Peng Ning Location-based pairwise key establishments for static sensor networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
1He Huang, Shyhtsun Felix Wu An approach to certificate path discovery in mobile Ad Hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF certificate path discovery, security, MANET, public key infrastructure
1Tansel Kaya, Guolong Lin, Guevara Noubir, Atilay Yilmaz Secure multicast groups on ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multihop ad hoc, MANET, tracking, secure multicast
1Shahan Yang, John S. Baras Modeling vulnerabilities of ad hoc routing protocols. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ad formal verification, ad hoc wireless networks
1Sanjeev Setia, Vipin Swarup (eds.) Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003 Search on Bibsonomy SASN The full citation details ... 2003 DBLP  BibTeX  RDF
1Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi Admission control in Peer-to-Peer: design and performance evaluation. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, performance, peer-to-peer, mobile ad-hoc networks, access control, admission control, group membership
1Chinyang Henry Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt A specification-based intrusion detection system for AODV. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF specification-based detection, MANET, intrusion detection, network monitor, AODV, P2P network
1Nicolas Prigent, Christophe Bidan, Jean-Pierre Andreaux, Olivier Heen Secure long term communities in ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF home network security, secure long term community, ad hoc networks security
1Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei Random key-assignment for secure Wireless Sensor Networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed wireless sensors networks, secure pair-wise communications, sensor-to-sensor authentication, key management protocols
1Yi-an Huang, Wenke Lee A cooperative intrusion detection system for ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #63 of 63 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license