Hidden fields
Books Books
" Attacks and countermeasures, in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. "
Body Sensor Networks - Page 370
edited by - 2007 - 494 pages
Limited preview - About this book

Networking -- ICN 2005: 4th International Conference on Networking, Reunion ...

Pascal Lorenz, Petre Dini - Computers - 2005 - 965 pages
...protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conf. on System Sciences. (2000) 4—7 2. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Elsevier's Adlloc Networks Journal, Special Issue on Sensor Network Applications and Protocols. Volume...
Limited preview - About this book

Handbook of Sensor Networks: Algorithms and Architectures

Ivan Stojmenovic - Technology & Engineering - 2005 - 553 pages
...Denial of service in sensor networks. IEEE Computer, 35(10):54-62, 2002. 23. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003 . 24. J. Newsome,...
Limited preview - About this book

Computational Science and Its Applications - ICCSA 2005: Pt. 3 ...

Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganà, Heow Pueh Lee, Youngson Mun, David Taniar, Chih Jeng Kenneth Tan - Computers - 2005 - 1403 pages
...wireless sensor networks: a survey. To appear in IEEE Wireless Communications. 20. C. Karlof, D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003. 21. J. Newsome,...
Limited preview - About this book

Embedded Software and Systems: Second International Conference, ICESS 2005 ...

Laurence T. Yang - Computers - 2005 - 804 pages
...Apr.2000. [5] Benjamin Greenstein et al., "DIPS: A Distributed Index for Features in Sensor Networks," in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, May.2003. [6] Yong Yao and Johannes Gehrke, "The Cougar Approach to In-Network Query...
Limited preview - About this book

Wireless Sensor Networks: Third European Workshop, EWSN 2006, Zurich ...

Holger Karl - Computers - 2006 - 353 pages
...Miami, Florida, March 2005. 12. D. Niculescu and B. Nath. Localized positioning in ad hoc networks. In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, San Diego, CA, May 2003. 13. N. Patwari and AO Hero III. Using proximity and quantized...
Limited preview - About this book

Advanced Web and Network Technologies, and Applications: APWeb 2006 ...

Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang - Computers - 2006 - 1083 pages
...Annual International Conference on Mobile Computing and Networks. (2001). 6. Karlof.C, Wangner.D., Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In Proceedings of 1 SI IEEE International Workshop on Sensor Networks Protocols and Application. (2003). 7. Pietro.RD,...
Limited preview - About this book

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc ...

Radha Poovendran, Cliff Wang, Sumit Roy - Technology & Engineering - 2007 - 396 pages
...Baltimore, Maryland, November 2004. 20. D. Niculescu and B. Nath. Localized positioning in ad hoc networks. In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, San Diego, CA, May 2003. 21. N. Patwari and A, O, Hero HI. Using proximity and quantized...
Limited preview - About this book

Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop ...

Frank Stajano - Business & Economics - 2007 - 257 pages
...A.: Trusted platform based key establishment and management for sensor networks (Under review) 16. Karlof, C., Wagner, D.: Secure routing in wireless...International Workshop on Sensor Network Protocols and Applications, pp. 113-127. IEEE Computer Society Press, Los Alamitos (2003) 17. Rivest, RL: The...
Limited preview - About this book

Network Security: Current Status and Future Directions

Christos Douligeris, Dimitrios N. Serpanos - Computers - 2007 - 608 pages
...Embedded Networked Sensor Systems (SenSys 2003). Nov. 2003, pp. 255-265. 26. C. KARLOF and D. WAGNER, Secure routing in wireless sensor networks: Attacks...International Workshop on Sensor Network Protocols and Applications, pp. 113-127, May 2003. 27. JR DOUCEUR, The sybil attack, paper presented at the First...
Limited preview - About this book

Frontiers of High Performance Computing and Networking - ISPA 2007 Workshops ...

Parimala Thulasiraman, Xubin He, Tony Li Xu - Computers - 2007 - 561 pages
...Physical related Byzantine attack X X X Secure Cluster Header Election Techniques in Sensor Network 31 5. Karlof, C., Wagner, D.: Secure routing in wireless...Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage AK, May 11,...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search