메뉴 건너뛰기




Volumn 25, Issue 8, 2013, Pages 1890-1903

Secure provenance transmission for streaming data

Author keywords

Data stream; Secure provenance; Sensor network; Transmission; Watermarking

Indexed keywords

DATA STREAM; FINANCIAL ANALYSIS; INTERPACKET DELAYS; SECURE PROVENANCE; SECURE TRANSMISSION; STORAGE EFFICIENCY; TIMING CHARACTERISTICS; WATERMARKING ALGORITHMS;

EID: 84897743314     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2012.31     Document Type: Article
Times cited : (52)

References (30)
  • 1
    • 84897689745 scopus 로고    scopus 로고
    • Namos, http://robotics.usc.edu/namos, 2011.
    • (2011) Namos
  • 22
  • 25
    • 31444456909 scopus 로고    scopus 로고
    • A survey of data provenance in e-science
    • DOI 10.1145/1084805.1084812
    • Y.L. Simmhan, B. Plale, and D. Gannon, "A Survey of Data Provenance in E-Science," SIGMOD Record, vol. 34, pp. 31-36, 2005. (Pubitemid 43152529)
    • (2005) SIGMOD Record , vol.34 , Issue.3 , pp. 31-36
    • Simmhan, Y.L.1    Plale, B.2    Gannon, D.3
  • 28
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • DOI 10.1109/SP.2007.30, 4223219, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • X. Wang, S. Chen, and S. Jajodia, "Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems," Proc. IEEE Symp. Security and Privacy (SP), pp. 116-130, 2007. (Pubitemid 47432521)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 116-130
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 30
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays," Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 20-29, 2003. (Pubitemid 40673785)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 20-29
    • Wang, X.1    Reeves, D.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.