Secure Data Transmission of Wireless Sensor Network Based on Information Hiding
暂无分享,去创建一个
Xingming Sun | Xiangrong Xiao | Minggang Chen | Lincong Yang | Xingming Sun | Lincong Yang | Xiangrong Xiao | Minggang Chen
[1] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[2] Song Liu,et al. Load shedding in stream databases: a control-based approach , 2006, VLDB.
[3] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[4] John A. Stankovic,et al. t-kernel: providing reliable OS support to wireless sensor networks , 2006, SenSys '06.
[5] Sushil Jajodia,et al. Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..
[6] Miodrag Potkonjak,et al. Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.
[7] Joshua R. Smith,et al. ID Modulation: Embedding Sensor Data in an RFID Timeseries , 2005, Information Hiding.
[8] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[9] Yunhao Liu,et al. Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[10] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[11] Nicholas F. Maxemchuk,et al. Electronic document distribution , 1994, AT&T Technical Journal.
[12] Alireza Keshavarz-Haddad,et al. Broadcast capacity in multihop wireless networks , 2006, MobiCom '06.
[13] Michael Stonebraker,et al. Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.
[14] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[15] John E. Kleider,et al. Radio frequency watermarking for OFDM wireless networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[16] Yunhao Liu,et al. Underground Structure Monitoring with Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[17] Srinivasan Seshan,et al. Self-management in chaotic wireless deployments , 2005, MobiCom '05.
[18] Radu Sion,et al. Rights protection for discrete numeric streams , 2006, IEEE Transactions on Knowledge and Data Engineering.
[19] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[20] Choong Seon Hong,et al. A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks , 2006, ICDCIT.