Sciweavers

445 search results - page 6 / 89
» An application-driven perspective on wireless sensor network...
Sort
View
68
Voted
WISTP
2007
Springer
15 years 3 months ago
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
Nicolas Fournel, Marine Minier, Stéphane Ub...
66
Voted
SASN
2003
ACM
15 years 2 months ago
Random key-assignment for secure Wireless Sensor Networks
Roberto Di Pietro, Luigi V. Mancini, Alessandro Me...
65
Voted
SASN
2003
ACM
15 years 2 months ago
Security support for in-network processing in Wireless Sensor Networks
Jing Deng, Richard Han, Shivakant Mishra
EUROPAR
2007
Springer
15 years 3 months ago
Securing Sensor Reports in Wireless Sensor Networks*
Abstract. The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and ...
Al-Sakib Khan Pathan, Choong Seon Hong
ICCSA
2005
Springer
15 years 3 months ago
On the Security of Wireless Sensor Networks
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-res...
Rodrigo Roman, Jianying Zhou, Javier Lopez