Team for Research in
Ubiquitous Secure Technology

Network Security Architecture for Demand Response/Sensor Networks
D. K. Mulligan, D. Wagner, U. Shankar, P.A. Subrahmanyam, E. Jones, J. Lerner

Citation
D. K. Mulligan, D. Wagner, U. Shankar, P.A. Subrahmanyam, E. Jones, J. Lerner. "Network Security Architecture for Demand Response/Sensor Networks". Technical report, On behalf of California Energy Commission, Public Interest Energy Research Group, January, 2005.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    D. K. Mulligan, D. Wagner, U. Shankar, P.A. Subrahmanyam, E.
    Jones, J. Lerner. <a
    href="http://www.truststc.org/pubs/66.html"
    ><i>Network Security Architecture for Demand
    Response/Sensor Networks</i></a>, Technical
    report,  On behalf of California Energy Commission, Public
    Interest Energy Research Group, January, 2005.
  • Plain text
    D. K. Mulligan, D. Wagner, U. Shankar, P.A. Subrahmanyam, E.
    Jones, J. Lerner. "Network Security Architecture for
    Demand Response/Sensor Networks". Technical report,  On
    behalf of California Energy Commission, Public Interest
    Energy Research Group, January, 2005.
  • BibTeX
    @techreport{MulliganWagnerShankarSubrahmanyamJonesLerner05_NetworkSecurityArchitectureForDemandResponseSensorNetworks,
        author = {D. K. Mulligan and D. Wagner and U. Shankar and
                  P.A. Subrahmanyam and E. Jones and J. Lerner},
        title = {Network Security Architecture for Demand
                  Response/Sensor Networks},
        institution = {On behalf of California Energy Commission, Public
                  Interest Energy Research Group},
        month = {January},
        year = {2005},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/66.html}
    }
    

Posted by Deirdre Mulligan on 17 Apr 2006.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.