-
1
-
-
0041513205
-
Watermarking relational data: Framework, algorithms, and analysis
-
Hong Kong, China
-
Agrawal, R., Haas, P. J. and Kiernan, J. (2003) ' Watermarking relational data: framework, algorithms, and analysis ', The Proceedings of the 28th International Conference On Very Large Data Bases, Hong Kong, China.
-
(2003)
The Proceedings of the 28th International Conference on Very Large Data Bases
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
2
-
-
35548961420
-
Practical algorithm for data security (PADs) in Wireless sensor networks
-
Beijing, China, June 2007
-
Albath, J. and Madria, S. (2007) ' Practical algorithm for data security (PADS) in wireless sensor networks ', Proceedings of the 6th ACM International Workshop on Data Engineering for Wireless and Mobile Access, pp. 9-16, Beijing, China, June 2007.
-
(2007)
Proceedings of the 6th ACM International Workshop on Data Engineering for Wireless and Mobile Access
, pp. 9-16
-
-
Albath, J.1
Madria, S.2
-
3
-
-
33644995185
-
Analysis and design of secure watermark-based authentication systems
-
March
-
Chuhong, F., Kundur, D. and Kwong, R. H. (2006) ' Analysis and design of secure watermark-based authentication systems ', IEEE Transactions on Information Forensics and Security, March, Vol. 1, No. 1, pp. 43-55.
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.1
, pp. 43-55
-
-
Chuhong, F.1
Kundur, D.2
Kwong, R.H.3
-
4
-
-
33749679756
-
Chaining watermarks for detecting malicious modifications to streaming data
-
January
-
Guo, H., Li, Y. and Jajodia, S. (2007) ' Chaining watermarks for detecting malicious modifications to streaming data ', Information Sciences, Elsevier, January, Vol. 177, No. 1, pp. 281-298.
-
(2007)
Information Sciences, Elsevier
, vol.177
, Issue.1
, pp. 281-298
-
-
Guo, H.1
Li, Y.2
Jajodia, S.3
-
5
-
-
33644685216
-
A fragile watermarking scheme for detecting malicious modifications of database relations
-
Elsevier, May
-
Guo, H., Li, Y., Liua, A. and Jajodia, S. (2006) ' A fragile watermarking scheme for detecting malicious modifications of database relations ', Journal of Information Sciences, Elsevier, May, Vol. 177, No. 10, pp. 1350-1378.
-
(2006)
Journal of Information Sciences
, vol.177
, Issue.10
, pp. 1350-1378
-
-
Guo, H.1
Li, Y.2
Liua, A.3
Jajodia, S.4
-
6
-
-
70349464986
-
Data integrity protection in R-trees
-
', Elsevier, DOI information: 10.1016/j.cose.2009.04.001
-
Kamel, I. (2009) ' Data integrity protection in R-trees ', International Journal of Computers and Security, Elsevier, DOI information: 10.1016/j.cose.2009.04.001.
-
(2009)
International Journal of Computers and Security
-
-
Kamel, I.1
-
8
-
-
26444574670
-
Tinysec: A link layer security architecture for Wireless sensor networks
-
Baltimore, Maryland, USA, November
-
Karlof, C., Sastry, N. and Wagner, D. (2004) ' TinySec: a link layer security architecture for wireless sensor networks ', Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, Maryland, USA, November, pp. 162-175.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
9
-
-
77951001715
-
Watermarking security: A survey
-
Luis, P-F., Pedro, C., Juan, R. T-P. and Fernando, P-F. (2006) ' Watermarking security: a survey ', Transactions on Data Hiding and Multimedia Security, October, pp. 41-72.
-
(2006)
Transactions on Data Hiding and Multimedia Security, October
, pp. 41-72
-
-
Luis, P.-F.1
Pedro, C.2
Juan, R.T.-P.3
Fernando, P.-F.4
-
10
-
-
35248863700
-
Smart phones for the elders: Boosting the intelligence of smart homes
-
Canada, July
-
Mann, W. and Helal, S. (2002) ' Smart phones for the elders: boosting the intelligence of smart homes ', Proceedings of the AAAI Workshop on Automation as Caregiver: The Role of Intelligent Technology in Elder Care, Edmonton, Canada, July.
-
(2002)
Proceedings of the AAAI Workshop on Automation As Caregiver: The Role of Intelligent Technology in Elder Care, Edmonton
-
-
Mann, W.1
Helal, S.2
-
11
-
-
33750319005
-
Security in Wireless sensor networks: Issues and challenges
-
Phoenix Park, Korea, February
-
Pathan, A. S. K., Hyung, L. and Hong, C. S (2006) ' Security in wireless sensor networks: issues and challenges ', Proceedings of 8th IEEE International Conference on Advanced Communication Technology, Phoenix Park, Korea, Vol. 2, pp. 1043-1048, February.
-
(2006)
Proceedings of 8th IEEE International Conference on Advanced Communication Technology
, vol.2
, pp. 1043-1048
-
-
Pathan, A.S.K.1
Hyung, L.2
Hong, C.S.3
-
12
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
July, Rome, Italy
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J. D. (2001) ' SPINS: security protocols for sensor networks ', Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, July, Rome, Italy.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
13
-
-
70350671924
-
Security mechanisms for Wireless sensor networks
-
March, China
-
Ren, X. and Yu, H. (2006) ' Security mechanisms for wireless sensor networks ', International Journal of Computer Science and Network Security, March, Vol. 6, No. 3, pp. 151-161, China.
-
(2006)
International Journal of Computer Science and Network Security
, vol.6
, Issue.3
, pp. 151-161
-
-
Ren, X.1
Yu, H.2
-
14
-
-
84872291479
-
Resilient rights protection for sensor streams
-
September, Toronto, Canada
-
Sion, R., Atallah, M. and Prabhakar, S. (2004) ' Resilient rights protection for sensor streams ', Proceedings of the 30th International Conference on Very Large Data Bases, September, Toronto, Canada, pp. 732-743.
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases
, pp. 732-743
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
16
-
-
18844368499
-
Encryption overhead in embedded systems and sensor network nodes: Modeling and analysis
-
October, San Jose, USA
-
Venugopalan, R., Ganesan, P., Peddabachagari, P., Dean, A., Mueller, F. and Sichitiu, M. (2003) ' Encryption overhead in embedded systems and sensor network nodes: modeling and analysis ', International Conference on Compilers, Architectures and Synthesis for Embedded Systems, October, San Jose, USA, pp. 188-197.
-
(2003)
International Conference on Compilers, Architectures and Synthesis for Embedded Systems
, pp. 188-197
-
-
Venugopalan, R.1
Ganesan, P.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
17
-
-
56949088196
-
A survey of security issues in Wireless sensor networks
-
June
-
Wang, Y., Attebury, G. and Ramamurthy, B. (2006) ' A survey of security issues in wireless sensor networks ', IEEE Communications Surveys and Tutorials, June, Vol. 8, No. 2, pp. 2-23.
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
18
-
-
70350671924
-
Security mechanisms for Wireless sensor networks
-
March, China
-
Xiuli, R. and Haibin, Y. (2006) ' Security mechanisms for wireless sensor networks ', International Journal of Computer Science and Network Security, March, China, Vol. 6, No. 3, pp. 151-161.
-
(2006)
International Journal of Computer Science and Network Security
, vol.6
, Issue.3
, pp. 151-161
-
-
Xiuli, R.1
Haibin, Y.2
|