Securing Data Communication of Internet of Things in 5G Using Network Steganography
暂无分享,去创建一个
Kai Wu | Junxiang Wang | Changlong Lu | Yixiang Fang | Yi Peng | Kai Tu | Yi Peng | Junxiang Wang | Kai Tu | Yixiang Fang | Kai Wu | Changlong Lu
[1] Changting Shi. A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security , 2018 .
[2] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[3] Khan Muhammad,et al. Steganography: A Secure way for Transmission in Wireless Sensor Networks , 2015, ArXiv.
[4] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[5] Shaohua Tang,et al. Attacks and Comments on Several Recently Proposed Key Management Schemes , 2013, IACR Cryptol. ePrint Arch..
[6] Sabu M. Thampi. Information Hiding Techniques: A Tutorial Review , 2008, ArXiv.
[7] Wei Chen,et al. Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network , 2019 .
[8] Wojciech Mazurczyk,et al. Retransmission steganography and its detection , 2011, Soft Comput..
[9] Wojciech Mazurczyk,et al. Principles and overview of network steganography , 2012, IEEE Communications Magazine.
[10] Baoyu Ma,et al. A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services , 2019 .
[11] Wojciech Mazurczyk,et al. Steganography of VoIP Streams , 2008, OTM Conferences.
[12] Stephen G. Wilson,et al. Digital Modulation and Coding , 1995 .
[13] Abdelbasset Trad,et al. Performance trade-offs of encryption algorithms for Wireless Sensor Networks , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).