-
1
-
-
0036488363
-
The first 50 years of electronic watermarking
-
I. J. Cox and M. L. Miller. The first 50 years of electronic watermarking. J. Appl. Signal Process., vol. 2, pp. 126-132, 2002.
-
(2002)
J. Appl. Signal Process.
, vol.2
, pp. 126-132
-
-
Cox, I.J.1
Miller, M.L.2
-
2
-
-
54449096880
-
An Approach to Evaluate Data Trustworthiness Based on Data Provenance
-
C. Dai, D. Lin, E. Bertino, and M. Kantarcioglu. An Approach to Evaluate Data Trustworthiness Based on Data Provenance. Intl. Workshop on Secure Data Management, pp. 82-98, 2008.
-
(2008)
Intl. Workshop on Secure Data Management
, pp. 82-98
-
-
Dai, C.1
Lin, D.2
Bertino, E.3
Kantarcioglu, M.4
-
5
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
I. Foster, J. Vockler, M. Wilde, Y. Zhao. Chimera: A virtual data system for representing, querying, and automating data derivation. Intl. Conf. on Scientific and Statistical Database Management, pp. 37-46, 2002.
-
(2002)
Intl. Conf. on Scientific and Statistical Database Management
, pp. 37-46
-
-
Foster, I.1
Vockler, J.2
Wilde, M.3
Zhao, Y.4
-
9
-
-
0034771605
-
SPINS: Security protocols for sensor netowrks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: security protocols for sensor netowrks. Wireless Networks, pp. 189-199, 2001.
-
(2001)
Wireless Networks
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
10
-
-
31444456909
-
A survey of data provenance in e-science
-
Y. L. Simmhan, B. Plale, and D. Gannon. A survey of data provenance in e-science. SIGMOD Record, Vol. 34, pp. 31-36, 2005.
-
(2005)
SIGMOD Record
, vol.34
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
11
-
-
79551638644
-
Provenance Based Information Trust-worthiness Evaluation in Multi-hop Networks
-
X. Wang, and P. Mohapatra. Provenance Based Information Trust-worthiness Evaluation in Multi-hop Networks, IEEE GLOBECOM, 2010.
-
IEEE GLOBECOM, 2010
-
-
Wang, X.1
Mohapatra, P.2
-
14
-
-
0242443772
-
ESRT: Event to Sink Reliable Transport in Wireless Sensor Networks
-
Y. Sankarasubramaniam, O. B. Akan and I. F. Akyildiz. ESRT: Event to Sink Reliable Transport in Wireless Sensor Networks. ACM MobiHoc, pp. 177-188, 2003.
-
(2003)
ACM MobiHoc
, pp. 177-188
-
-
Sankarasubramaniam, Y.1
Akan, O.B.2
Akyildiz, I.F.3
-
15
-
-
84944414611
-
ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks
-
B. Deb, S. Bhatnagar, and B. Nath. ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks. IEEE Local Computer Networks, 2003, pp: 406-415.
-
(2003)
IEEE Local Computer Networks
, pp. 406-415
-
-
Deb, B.1
Bhatnagar, S.2
Nath, B.3
-
17
-
-
34547266421
-
An energy-efficient multipath routing protocol for wireless sensor networks
-
DOI 10.1002/dac.843
-
Y. Lu, V.Wong. An energy efficient multipath routing protocol for wireless sensor networks. International Journal of Communication Systems. 2007, pp:747-766 (Pubitemid 47144942)
-
(2007)
International Journal of Communication Systems
, vol.20
, Issue.7
, pp. 747-766
-
-
Lu, Y.M.1
Wong, V.W.S.2
-
18
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. C. Hu, A. Perrig, and D.B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. IEEE INFOCOM, 2003, pp. 1976-986
-
(2003)
IEEE INFOCOM
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
19
-
-
27544510780
-
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
-
C. Basile, Z. Kalbarczyk, and R. K. Iyer. Neutralization of Errors and Attacks in Wireless Ad Hoc Networks. DSN 2005, pp. 518-527.
-
(2005)
DSN
, pp. 518-527
-
-
Basile, C.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
20
-
-
70350757800
-
Packet-dropping Adversary Identification for Data Plane Security
-
X. Zhang, A. Jain, and A. Perrig. Packet-dropping Adversary Identification for Data Plane Security. The 4th ACM SIGCOMM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Madrid, Spain, December, 2008.
-
The 4th ACM SIGCOMM International Conference on Emerging Networking EXperiments and Technologies (CoNEXT), Madrid, Spain, December, 2008
-
-
Zhang, X.1
Jain, A.2
Perrig, A.3
-
21
-
-
11244309425
-
JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks
-
B. Carbunar, I. Ioannidis and C. Nita-Rotaru. JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks. WiSe 2004, pp. 11-20.
-
(2004)
WiSe
, pp. 11-20
-
-
Carbunar, B.1
Ioannidis, I.2
Nita-Rotaru, C.3
|