Author:
Ramasamy Jayanthi,Kumaresan John Singh
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference28 articles.
1. Kim, J., Jang, K. Y., Choo, H., & Kim, W. (2007). Energy efficient LEACH with TCP for wireless sensor networks. In Computational science and its applications–ICCSA 2007 (pp. 275–285).
2. Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing,3(4), 366–379.
3. Younis, O., & Fahmy, S. (2004). Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach. In Proceedings of IEEE INFOCOM, March 2004, an extended version appears in IEEE transactions on mobile computing (Vol. 3(4)), October–December, 2004.
4. Cheng, H., & Li, X. (2000). Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing,48(8), 2439–2451.
5. Mukesh, R., Damodaram, A., & Subbiah Bharathi, V. (2008). Robust and secure image transmission in wireless sensor networks using enhanced compression and encryption. In ACST’08 proceedings of the 4th IASTED international conference on advances in computer science and technology (pp. 174–178).
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献