Public-key based access control in sensornet View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2011-07

AUTHORS

Haodong Wang, Bo Sheng, Chiu C. Tan, Qun Li

ABSTRACT

Symmetric cryptography has been mostly used in security schemes in sensor networks due to the concern that public key cryptography (PKC) is too expensive for sensor devices. While these schemes are efficient in processing time, they generally require complicated key management, which may introduce high memory and communication overhead. On the contrary, PKC-based schemes have simple and clean key management, but cost more computational time. The recent progress in PKC implementation, specially elliptic curve cryptography (ECC), on sensors motivates us to design a PKC-based security scheme and compare its performance with the symmetric-key counterparts. This paper proposes a practical PKC-based access control for sensor networks, which consists of pairwise key establishment, local access control, and remote access control. We have implemented both cryptographic primitives on commercial off-the-shelf sensor devices. Building the user access control as a case study, we show that PKC-based protocol is more advantageous than those built on symmetric cryptography in terms of the memory usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing PKC-based security protocols for sensor networks. More... »

PAGES

1217-1234

References to SciGraph publications

  • 2004. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004
  • 2006. Distributed User Access Control in Sensor Networks in DISTRIBUTED COMPUTING IN SENSOR SYSTEMS
  • 2001-08-02. Identity-Based Encryption from the Weil Pairing in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • 2010-05. Achieving robust message authentication in sensor networks: a public-key based approach in WIRELESS NETWORKS
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11276-011-0343-x

    DOI

    http://dx.doi.org/10.1007/s11276-011-0343-x

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1008493490


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Cleveland State University", 
              "id": "https://www.grid.ac/institutes/grid.254298.0", 
              "name": [
                "Department of Computer and Information Science, Cleveland State University, 44115, Cleveland, OH, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Wang", 
            "givenName": "Haodong", 
            "id": "sg:person.016301245451.53", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016301245451.53"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Massachusetts Boston", 
              "id": "https://www.grid.ac/institutes/grid.266685.9", 
              "name": [
                "Department of Computer Science, University of Massachusetts Boston, 02125, Boston, MA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sheng", 
            "givenName": "Bo", 
            "id": "sg:person.011762156103.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011762156103.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Temple University", 
              "id": "https://www.grid.ac/institutes/grid.264727.2", 
              "name": [
                "Department of Computer and Information Science, Temple University, 19122, Philadelphia, PA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Tan", 
            "givenName": "Chiu C.", 
            "id": "sg:person.07362743265.58", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07362743265.58"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "College of William & Mary", 
              "id": "https://www.grid.ac/institutes/grid.264889.9", 
              "name": [
                "Department of Computer Science, College of William and Mary, 23187, Williamsburg, VA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Li", 
            "givenName": "Qun", 
            "id": "sg:person.0724025770.80", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0724025770.80"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1031495.1031515", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005791825"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/586110.586117", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007488868"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008174972", 
              "https://doi.org/10.1007/978-3-540-28632-5_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008174972", 
              "https://doi.org/10.1007/978-3-540-28632-5_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1127777.1127833", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011126389"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014375289", 
              "https://doi.org/10.1007/3-540-44647-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014375289", 
              "https://doi.org/10.1007/3-540-44647-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948119", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015460222"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1062689.1062737", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017862720"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11776178_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018798588", 
              "https://doi.org/10.1007/11776178_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11776178_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018798588", 
              "https://doi.org/10.1007/11776178_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948120", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023856958"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948118", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029515707"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11276-009-0184-z", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029991856", 
              "https://doi.org/10.1007/s11276-009-0184-z"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11276-009-0184-z", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029991856", 
              "https://doi.org/10.1007/s11276-009-0184-z"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1134680.1134683", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034504039"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/359168.359176", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036015253"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/236387.236439", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053401676"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/35.312841", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061158963"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/jsac.2005.861382", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061316910"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1504/ijsn.2006.011772", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1067492151"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infcom.2004.1354666", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093171099"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/wcnc.2005.1424811", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093288734"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/secpri.2004.1301328", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093596161"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/infcom.2005.1497920", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093867863"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sahcn.2004.1381904", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094836559"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2011-07", 
        "datePublishedReg": "2011-07-01", 
        "description": "Symmetric cryptography has been mostly used in security schemes in sensor networks due to the concern that public key cryptography (PKC) is too expensive for sensor devices. While these schemes are efficient in processing time, they generally require complicated key management, which may introduce high memory and communication overhead. On the contrary, PKC-based schemes have simple and clean key management, but cost more computational time. The recent progress in PKC implementation, specially elliptic curve cryptography (ECC), on sensors motivates us to design a PKC-based security scheme and compare its performance with the symmetric-key counterparts. This paper proposes a practical PKC-based access control for sensor networks, which consists of pairwise key establishment, local access control, and remote access control. We have implemented both cryptographic primitives on commercial off-the-shelf sensor devices. Building the user access control as a case study, we show that PKC-based protocol is more advantageous than those built on symmetric cryptography in terms of the memory usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing PKC-based security protocols for sensor networks.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s11276-011-0343-x", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.3092936", 
            "type": "MonetaryGrant"
          }, 
          {
            "id": "sg:grant.3080348", 
            "type": "MonetaryGrant"
          }, 
          {
            "id": "sg:grant.3084959", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1327893", 
            "issn": [
              "1022-0038", 
              "1572-8196"
            ], 
            "name": "Wireless Networks", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "5", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "17"
          }
        ], 
        "name": "Public-key based access control in sensornet", 
        "pagination": "1217-1234", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "2876dfdea8c0422dceb2f5ee26b8cd18ec4fefd7ba810b54ae062b444ccc5df9"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11276-011-0343-x"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1008493490"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11276-011-0343-x", 
          "https://app.dimensions.ai/details/publication/pub.1008493490"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-10T20:49", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8684_00000520.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "http://link.springer.com/10.1007%2Fs11276-011-0343-x"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11276-011-0343-x'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11276-011-0343-x'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11276-011-0343-x'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11276-011-0343-x'


     

    This table displays all metadata directly associated to this object as RDF triples.

    167 TRIPLES      21 PREDICATES      49 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11276-011-0343-x schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Nf085f15382ab4773b332c1647ad948b4
    4 schema:citation sg:pub.10.1007/11776178_19
    5 sg:pub.10.1007/3-540-44647-8_13
    6 sg:pub.10.1007/978-3-540-28632-5_9
    7 sg:pub.10.1007/s11276-009-0184-z
    8 https://doi.org/10.1109/35.312841
    9 https://doi.org/10.1109/infcom.2004.1354666
    10 https://doi.org/10.1109/infcom.2005.1497920
    11 https://doi.org/10.1109/jsac.2005.861382
    12 https://doi.org/10.1109/sahcn.2004.1381904
    13 https://doi.org/10.1109/secpri.2004.1301328
    14 https://doi.org/10.1109/wcnc.2005.1424811
    15 https://doi.org/10.1145/1031495.1031515
    16 https://doi.org/10.1145/1062689.1062737
    17 https://doi.org/10.1145/1127777.1127833
    18 https://doi.org/10.1145/1134680.1134683
    19 https://doi.org/10.1145/236387.236439
    20 https://doi.org/10.1145/359168.359176
    21 https://doi.org/10.1145/586110.586117
    22 https://doi.org/10.1145/948109.948118
    23 https://doi.org/10.1145/948109.948119
    24 https://doi.org/10.1145/948109.948120
    25 https://doi.org/10.1504/ijsn.2006.011772
    26 schema:datePublished 2011-07
    27 schema:datePublishedReg 2011-07-01
    28 schema:description Symmetric cryptography has been mostly used in security schemes in sensor networks due to the concern that public key cryptography (PKC) is too expensive for sensor devices. While these schemes are efficient in processing time, they generally require complicated key management, which may introduce high memory and communication overhead. On the contrary, PKC-based schemes have simple and clean key management, but cost more computational time. The recent progress in PKC implementation, specially elliptic curve cryptography (ECC), on sensors motivates us to design a PKC-based security scheme and compare its performance with the symmetric-key counterparts. This paper proposes a practical PKC-based access control for sensor networks, which consists of pairwise key establishment, local access control, and remote access control. We have implemented both cryptographic primitives on commercial off-the-shelf sensor devices. Building the user access control as a case study, we show that PKC-based protocol is more advantageous than those built on symmetric cryptography in terms of the memory usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing PKC-based security protocols for sensor networks.
    29 schema:genre research_article
    30 schema:inLanguage en
    31 schema:isAccessibleForFree true
    32 schema:isPartOf Nac0a6a7c397f4268b6d416f6e090b01c
    33 Nbc6f2728fe60478c95ea13ae98a83764
    34 sg:journal.1327893
    35 schema:name Public-key based access control in sensornet
    36 schema:pagination 1217-1234
    37 schema:productId N23e613c5620042e5bf3d05f00be2b713
    38 Nbb6927a4d25842f087af3a5bd1df8271
    39 Nbc17398997284e6f9a5a9cc9610b5feb
    40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008493490
    41 https://doi.org/10.1007/s11276-011-0343-x
    42 schema:sdDatePublished 2019-04-10T20:49
    43 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    44 schema:sdPublisher N95c7abd593d24f98b8ec7cde6894a873
    45 schema:url http://link.springer.com/10.1007%2Fs11276-011-0343-x
    46 sgo:license sg:explorer/license/
    47 sgo:sdDataset articles
    48 rdf:type schema:ScholarlyArticle
    49 N23e613c5620042e5bf3d05f00be2b713 schema:name dimensions_id
    50 schema:value pub.1008493490
    51 rdf:type schema:PropertyValue
    52 N434bae2888f14b4380c421ca53c51597 rdf:first sg:person.011762156103.37
    53 rdf:rest N74ed6feffe0f4e4598267686d7c4fd9c
    54 N6676a287ae0344b7a27bccf7aea8f7ce rdf:first sg:person.0724025770.80
    55 rdf:rest rdf:nil
    56 N74ed6feffe0f4e4598267686d7c4fd9c rdf:first sg:person.07362743265.58
    57 rdf:rest N6676a287ae0344b7a27bccf7aea8f7ce
    58 N95c7abd593d24f98b8ec7cde6894a873 schema:name Springer Nature - SN SciGraph project
    59 rdf:type schema:Organization
    60 Nac0a6a7c397f4268b6d416f6e090b01c schema:issueNumber 5
    61 rdf:type schema:PublicationIssue
    62 Nbb6927a4d25842f087af3a5bd1df8271 schema:name doi
    63 schema:value 10.1007/s11276-011-0343-x
    64 rdf:type schema:PropertyValue
    65 Nbc17398997284e6f9a5a9cc9610b5feb schema:name readcube_id
    66 schema:value 2876dfdea8c0422dceb2f5ee26b8cd18ec4fefd7ba810b54ae062b444ccc5df9
    67 rdf:type schema:PropertyValue
    68 Nbc6f2728fe60478c95ea13ae98a83764 schema:volumeNumber 17
    69 rdf:type schema:PublicationVolume
    70 Nf085f15382ab4773b332c1647ad948b4 rdf:first sg:person.016301245451.53
    71 rdf:rest N434bae2888f14b4380c421ca53c51597
    72 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    73 schema:name Information and Computing Sciences
    74 rdf:type schema:DefinedTerm
    75 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    76 schema:name Data Format
    77 rdf:type schema:DefinedTerm
    78 sg:grant.3080348 http://pending.schema.org/fundedItem sg:pub.10.1007/s11276-011-0343-x
    79 rdf:type schema:MonetaryGrant
    80 sg:grant.3084959 http://pending.schema.org/fundedItem sg:pub.10.1007/s11276-011-0343-x
    81 rdf:type schema:MonetaryGrant
    82 sg:grant.3092936 http://pending.schema.org/fundedItem sg:pub.10.1007/s11276-011-0343-x
    83 rdf:type schema:MonetaryGrant
    84 sg:journal.1327893 schema:issn 1022-0038
    85 1572-8196
    86 schema:name Wireless Networks
    87 rdf:type schema:Periodical
    88 sg:person.011762156103.37 schema:affiliation https://www.grid.ac/institutes/grid.266685.9
    89 schema:familyName Sheng
    90 schema:givenName Bo
    91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011762156103.37
    92 rdf:type schema:Person
    93 sg:person.016301245451.53 schema:affiliation https://www.grid.ac/institutes/grid.254298.0
    94 schema:familyName Wang
    95 schema:givenName Haodong
    96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016301245451.53
    97 rdf:type schema:Person
    98 sg:person.0724025770.80 schema:affiliation https://www.grid.ac/institutes/grid.264889.9
    99 schema:familyName Li
    100 schema:givenName Qun
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0724025770.80
    102 rdf:type schema:Person
    103 sg:person.07362743265.58 schema:affiliation https://www.grid.ac/institutes/grid.264727.2
    104 schema:familyName Tan
    105 schema:givenName Chiu C.
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07362743265.58
    107 rdf:type schema:Person
    108 sg:pub.10.1007/11776178_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018798588
    109 https://doi.org/10.1007/11776178_19
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/3-540-44647-8_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014375289
    112 https://doi.org/10.1007/3-540-44647-8_13
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/978-3-540-28632-5_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008174972
    115 https://doi.org/10.1007/978-3-540-28632-5_9
    116 rdf:type schema:CreativeWork
    117 sg:pub.10.1007/s11276-009-0184-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1029991856
    118 https://doi.org/10.1007/s11276-009-0184-z
    119 rdf:type schema:CreativeWork
    120 https://doi.org/10.1109/35.312841 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061158963
    121 rdf:type schema:CreativeWork
    122 https://doi.org/10.1109/infcom.2004.1354666 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093171099
    123 rdf:type schema:CreativeWork
    124 https://doi.org/10.1109/infcom.2005.1497920 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093867863
    125 rdf:type schema:CreativeWork
    126 https://doi.org/10.1109/jsac.2005.861382 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061316910
    127 rdf:type schema:CreativeWork
    128 https://doi.org/10.1109/sahcn.2004.1381904 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094836559
    129 rdf:type schema:CreativeWork
    130 https://doi.org/10.1109/secpri.2004.1301328 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093596161
    131 rdf:type schema:CreativeWork
    132 https://doi.org/10.1109/wcnc.2005.1424811 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093288734
    133 rdf:type schema:CreativeWork
    134 https://doi.org/10.1145/1031495.1031515 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005791825
    135 rdf:type schema:CreativeWork
    136 https://doi.org/10.1145/1062689.1062737 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017862720
    137 rdf:type schema:CreativeWork
    138 https://doi.org/10.1145/1127777.1127833 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011126389
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1145/1134680.1134683 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034504039
    141 rdf:type schema:CreativeWork
    142 https://doi.org/10.1145/236387.236439 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053401676
    143 rdf:type schema:CreativeWork
    144 https://doi.org/10.1145/359168.359176 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036015253
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1145/586110.586117 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007488868
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1145/948109.948118 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029515707
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1145/948109.948119 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015460222
    151 rdf:type schema:CreativeWork
    152 https://doi.org/10.1145/948109.948120 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023856958
    153 rdf:type schema:CreativeWork
    154 https://doi.org/10.1504/ijsn.2006.011772 schema:sameAs https://app.dimensions.ai/details/publication/pub.1067492151
    155 rdf:type schema:CreativeWork
    156 https://www.grid.ac/institutes/grid.254298.0 schema:alternateName Cleveland State University
    157 schema:name Department of Computer and Information Science, Cleveland State University, 44115, Cleveland, OH, USA
    158 rdf:type schema:Organization
    159 https://www.grid.ac/institutes/grid.264727.2 schema:alternateName Temple University
    160 schema:name Department of Computer and Information Science, Temple University, 19122, Philadelphia, PA, USA
    161 rdf:type schema:Organization
    162 https://www.grid.ac/institutes/grid.264889.9 schema:alternateName College of William & Mary
    163 schema:name Department of Computer Science, College of William and Mary, 23187, Williamsburg, VA, USA
    164 rdf:type schema:Organization
    165 https://www.grid.ac/institutes/grid.266685.9 schema:alternateName University of Massachusetts Boston
    166 schema:name Department of Computer Science, University of Massachusetts Boston, 02125, Boston, MA, USA
    167 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...