Author:
Cionca Victor,Newe Thomas,Dădârlat Vasile Teodor
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference36 articles.
1. Zhu, S., Setia, S., and Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM, New York, NY, USA (2003)
2. Prasad, N.R., Alam, M.: Security framework for wireless sensor networks. Wirel. Pers. Commun. 37, 455–469 (2006)
3. Law, Y.W., Havinga, P.J.M.: How to secure a wireless sensor network. Intelligent sensors, sensor networks and information processing conference, 2005. In: Proceedings of the 2005 International Conference on Dec., pp. 89–95 (2005)
4. Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible security synthesis for wireless sensor networks. In: MidSens ’08: Proceedings of the 3rd International Workshop on Middleware for Sensor Networks, pp. 19–24. ACM, New York, NY, USA (2008)
5. Peter, S., Piotrowski, K., Langendorfer, P.: In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. In: Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, pp. 778–785 (2008)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献