Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference16 articles.
1. An application-level data transparent authentication scheme without communication overhead;Chen;IEEE Transactions on Computer,2010
2. Chaining watermarks for detecting malicious modifications to streaming data;Guo;Information Sciences,2007
3. Simplified watermarking scheme for sensor networks;Kamel;International Journal of Internet Protocol Technology,2010
4. A lightweight data integrity scheme for sensor networks;Kamel;Sensors,2011
5. C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, 2004, pp. 162–175.
Cited by
46 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献