DOSM: A Data-Oriented Security Model Based on Information Hiding in WSNs
暂无分享,去创建一个
Xinbing Wang | Xingming Sun | Lei Rao | Xiangrong Xiao | Xinbing Wang | Xingming Sun | L. Rao | Xiangrong Xiao
[1] M. Mitrea. Proving video stream watermarking viability , 2008 .
[2] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[3] Bryan Ford,et al. Structured streams: a new transport abstraction , 2007, SIGCOMM '07.
[4] Sushil Jajodia,et al. Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..
[5] Radu Sion,et al. Rights protection for discrete numeric streams , 2006, IEEE Transactions on Knowledge and Data Engineering.
[6] Joshua R. Smith,et al. ID Modulation: Embedding Sensor Data in an RFID Timeseries , 2005, Information Hiding.
[7] Miodrag Potkonjak,et al. Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.
[8] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[9] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[10] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[11] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.