$$\hbox {S}^2$$S2DCC: secure selective dropping congestion control in hybrid wireless multimedia sensor networks
暂无分享,去创建一个
Gennaro Boggia | Luigi Alfredo Grieco | Sabrina Sicari | Alberto Coen-Porisini | Alessandra Rizzardi | Michele Tortelli
[1] Luigi Alfredo Grieco,et al. GoNe: Dealing with node behavior , 2015, 2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).
[2] Jolanta Brzostek-Pawłowska. Multimedia Mathematical Communication in a Diverse Group of Students , 2019 .
[3] Jong Hyuk Park,et al. Privacy Protection and Access Control of Image Information Processing Devices , 2011 .
[4] K. Deergha Rao,et al. A New and Secure Cryptosystem for Image Encryption and Decryption , 2011 .
[5] Martin Reisslein,et al. A survey of multimedia streaming in wireless sensor networks , 2008, IEEE Communications Surveys & Tutorials.
[6] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[7] Sara Tedmori,et al. Image cryptographic algorithm based on the Haar wavelet transform , 2014, Inf. Sci..
[8] Gennaro Boggia,et al. SETA: A secure sharing of tasks in clustered wireless sensor networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[9] Falko Dressler,et al. Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[10] Gennaro Boggia,et al. DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks , 2012, J. Syst. Softw..
[11] Li-Hua Gong,et al. Novel color image encryption algorithm based on the reality preserving fractional Mellin transform , 2012 .
[12] Jun Lang,et al. Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform and chaos permutation , 2012 .
[13] Hamid R. Rabiee,et al. WCCP: A congestion control protocol for wireless multimedia communication in sensor networks , 2014, Ad Hoc Networks.
[14] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[15] Raheem A. Beyah,et al. Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[16] Hamid Sharif,et al. A cross layer resource allocation scheme for secure image delivery in wireless sensor networks , 2007, IWCMC.
[17] Xingyuan Wang,et al. Chaos-based partial encryption of SPIHT coded color images , 2013, Signal Process..
[18] Alfred Mertins,et al. Fully spatial and SNR scalable, SPIHT-based image coding for transmission over heterogenous networks , 2003 .
[19] William A. Pearlman,et al. A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..
[20] Gennaro Boggia,et al. Selective Dropping Congestion Control for wireless multimedia sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[21] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[22] I. Daubechies,et al. Factoring wavelet transforms into lifting steps , 1998 .
[23] Srinivasan Seshan,et al. Synopsis diffusion for robust aggregation in sensor networks , 2008, ACM Trans. Sens. Networks.
[24] Anthony Tzes,et al. A hybrid scheme for video transmission over wireless multimedia sensor networks , 2009, 2009 17th Mediterranean Conference on Control and Automation.
[25] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[26] Mohan Trivedi,et al. The networked sensor tapestry (NeST): a privacy enhanced software architecture for interactive analysis of data in video-sensor networks , 2004, VSSN '04.
[27] Ian F. Akyildiz,et al. A survey on wireless multimedia sensor networks , 2007, Comput. Networks.
[28] Shaoming Pan,et al. A content security protection scheme in JPEG compressed domain , 2014, J. Vis. Commun. Image Represent..
[29] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[30] D. Patil,et al. Priority-based Congestion Control Protocol (PCCP) for controlling upstream congestion in Wireless Sensor Network , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[31] Gennaro Boggia,et al. Secure Wireless Multimedia Sensor Networks: A Survey , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[32] Anthony Vetro,et al. Energy efficient JPEG 2000 image transmission over wireless sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[33] Khumanthem Manglem Singh,et al. Image Encryption using Elliptic Curve Cryptography , 2015 .
[34] Imran Shafi,et al. Enhanced Image Encryption Techniques Using Modified Advanced Encryption Standard , 2012 .
[35] Birendra Biswal,et al. Security of image in multimedia applications , 2011, 2011 International Conference on Energy, Automation and Signal.
[36] Fathi E. Abd El-Samie,et al. Efficient implementation of chaotic image encryption in transform domains , 2014, J. Syst. Softw..
[37] Özlem Durmaz Incel,et al. SUIT: A Cross Layer Image Transport Protocol with Fuzzy Logic Based Congestion Control for Wireless Multimedia Sensor Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[38] Chieh-Yih Wan,et al. CODA: congestion detection and avoidance in sensor networks , 2003, SenSys '03.