Secure and Energy-Efficient Data Collection in Wireless Sensor Networks

[1]  Di Xiao,et al.  A reversible watermarking authentication scheme for wireless sensor networks , 2013, Inf. Sci..

[2]  Xue Zhao,et al.  A new clustering routing algorithm for wsn based on brief artificial fish-school optimization and ant colony optimization , 2013 .

[3]  Christoph Krauß,et al.  Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids , 2013, IEEE Journal on Selected Areas in Communications.

[4]  N. Rajkumar,et al.  Dropping False Packet to Increase the Network Lifetime of Wireless Sensor Network using EFDD Protocol , 2013, Wirel. Pers. Commun..

[5]  Kyong-jin Kim,et al.  Privacy Care Architecture in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[6]  Jianhua Li,et al.  Escrowable identity-based authenticated key agreement protocol with strong security , 2013, Comput. Math. Appl..

[7]  Guohong Cao,et al.  Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.

[8]  Min Wu,et al.  An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.

[9]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[10]  Minyi Guo,et al.  A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks , 2010, IEICE Trans. Inf. Syst..

[11]  Chuang Lin,et al.  A secure multipath routing protocol in mobile ad hoc networks , 2010, Concurr. Comput. Pract. Exp..

[12]  Martin S. Olivier,et al.  Privacy contracts incorporated in a privacy protection framework , 2006, Comput. Syst. Sci. Eng..