LEAP+ Efficient security mechanisms for large-scale distributed sensor networks S Zhu, S Setia, S Jajodia ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006 | 2754 | 2006 |
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks S Zhu, S Setia, S Jajodia, P Ning IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004 | 841 | 2004 |
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach S Zhu, S Xu, S Setia, S Jajodia 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 481 | 2003 |
Kronos: A scalable group re-keying approach for secure multicast S Setia, S Koussih, S Jajodia, E Harder Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 215-228, 2000 | 409 | 2000 |
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks S Zhu, S Xu, S Setia, S Jajodia 23rd International Conference on Distributed Computing Systems Workshops …, 2003 | 217 | 2003 |
Secure data aggregation in wireless sensor networks S Roy, M Conti, S Setia, S Jajodia IEEE Transactions on Information Forensics and Security 7 (3), 1040-1052, 2012 | 196 | 2012 |
Efficient distributed detection of node replication attacks in sensor networks B Zhu, VGK Addada, S Setia, S Jajodia, S Roy Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 173 | 2007 |
Availability and utility of idle memory in workstation clusters A Acharya, S Setia Proceedings of the 1999 ACM SIGMETRICS international conference on …, 1999 | 169 | 1999 |
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks S Zhu, S Setia, S Xu, S Jajodia Journal of Computer Security 14 (4), 301-325, 2006 | 158 | 2006 |
Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact S Roy, M Conti, S Setia, S Jajodia IEEE Transactions on Information Forensics and Security 9 (4), 681-694, 2014 | 144 | 2014 |
Localized multicast: efficient and distributed replica detection in large-scale sensor networks B Zhu, S Setia, S Jajodia, S Roy, L Wang IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010 | 128 | 2010 |
Performance analysis of job scheduling policies in parallel supercomputing environments VK Naik, MS Squillante, SK Setia Proceedings of the 1993 ACM/IEEE conference on Supercomputing, 824-833, 1993 | 113 | 1993 |
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks S Zhu, S Setia, S Jajodia, P Ning ACM Transactions on Sensor Networks (TOSN) 3 (3), 14-es, 2007 | 103 | 2007 |
CORD: Energy-efficient reliable bulk data dissemination in sensor networks L Huang, S Setia IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 574-582, 2008 | 101 | 2008 |
A fault-tolerant algorithm for replicated data management S Rangarajan, S Setia, SK Tripathi IEEE Transactions on parallel and distributed systems 6 (12), 1271-1282, 1995 | 94 | 1995 |
Attack-resilient hierarchical data aggregation in sensor networks S Roy, S Setia, S Jajodia Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006 | 76 | 2006 |
Dodo: A user-level system for exploiting idle memory in workstation clusters S Koussih, A Acharya, S Setia Proceedings. The Eighth International Symposium on High Performance …, 1999 | 75 | 1999 |
A comparative performance analysis of reliable group rekey transport protocols for secure multicast S Setia, S Zhu, S Jajodia Performance Evaluation 49 (1-4), 21-41, 2002 | 72 | 2002 |
Securing MAODV: attacks and countermeasures. S Roy, VGK Addada, S Setia, S Jajodia SECON, 521-532, 2005 | 69 | 2005 |
Performance optimizations for group key management schemes S Zhu, S Setia, S Jajodia 23rd International Conference on Distributed Computing Systems, 2003 …, 2003 | 63 | 2003 |