ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Robust data authentication for unattended wireless sensor networks
Telecommunication Systems
◽
10.1007/s11235-017-0281-8
◽
2017
◽
Vol 66
(2)
◽
pp. 181-196
◽
Cited By ~ 1
Author(s):
Mostafa H. Dahshan
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Data Authentication
◽
Unattended Wireless Sensor Networks
Download Full-text
Related Documents
Cited By
References
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
◽
10.1109/trustcom.2011.53
◽
2011
◽
Cited By ~ 5
Author(s):
Tassos Dimitriou
◽
Ahmad Sabouri
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Authentication Scheme
◽
Wireless Sensor
◽
Data Authentication
◽
Unattended Wireless Sensor Networks
Download Full-text
Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary
2013 IEEE Wireless Communications and Networking Conference (WCNC)
◽
10.1109/wcnc.2013.6554843
◽
2013
◽
Cited By ~ 4
Author(s):
Sasi Kiran V.L. Reddy
◽
Sushmita Ruj
◽
Amiya Nayak
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Authentication Scheme
◽
Wireless Sensor
◽
Data Authentication
◽
Unattended Wireless Sensor Networks
◽
Mobile Adversary
Download Full-text
A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks
2016 International Conference on Networking and Network Applications (NaNA)
◽
10.1109/nana.2016.85
◽
2016
◽
Cited By ~ 2
Author(s):
Hong Zhong
◽
Lili Shao
◽
Jie Cui
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Privacy Preservation
◽
Authentication Scheme
◽
Wireless Sensor
◽
Data Authentication
◽
Secure Data
Download Full-text
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
◽
10.4108/icst.mobiquitous2009.6824
◽
2009
◽
Cited By ~ 7
Author(s):
Attila Altay Yavuz
◽
Peng Ning
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Secure and resilient scheme for data protection in unattended wireless sensor networks
2017 1st Cyber Security in Networking Conference (CSNet)
◽
10.1109/csnet.2017.8241998
◽
2017
◽
Cited By ~ 4
Author(s):
Katarzyna Kapusta
◽
Gerard Memmi
◽
Hassan Noura
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Protection
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks
2009 3rd International Conference on New Technologies, Mobility and Security
◽
10.1109/ntms.2009.5384753
◽
2009
◽
Cited By ~ 4
Author(s):
Yi Ren
◽
Vladimir Oleshchuk
◽
Frank Y. Li
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Storage
◽
Wireless Sensor
◽
Efficient Data
◽
Unattended Wireless Sensor Networks
Download Full-text
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks
annals of telecommunications - annales des télécommunications
◽
10.1007/s12243-018-0684-x
◽
2019
◽
Vol 74
(3-4)
◽
pp. 157-165
◽
Cited By ~ 7
Author(s):
Katarzyna Kapusta
◽
Gerard Memmi
◽
Hassan Noura
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Homomorphic Encryption
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Convex-Hull-Based Boundary Detection in Unattended Wireless Sensor Networks
IEEE Sensors Letters
◽
10.1109/lsens.2017.2731200
◽
2017
◽
Vol 1
(4)
◽
pp. 1-4
◽
Cited By ~ 6
Author(s):
A. Pravin Renold
◽
S. Chandrakala
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Convex Hull
◽
Boundary Detection
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks
Journal of Communications
◽
10.4304/jcm.4.11.894-901
◽
2009
◽
Vol 4
(11)
◽
Cited By ~ 7
Author(s):
Wei Ren
◽
Junge Zhao
◽
Yi Ren
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Network Coding
◽
Wireless Sensor
◽
Efficient Data
◽
Unattended Wireless Sensor Networks
Download Full-text
Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
IET Information Security
◽
10.1049/iet-ifs.2014.0267
◽
2015
◽
Vol 9
(4)
◽
pp. 223-233
◽
Cited By ~ 6
Author(s):
Amir S. Elsafrawey
◽
Emad S. Hassan
◽
Moawad I. Dessouky
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Self Healing
◽
Data Reliability
◽
Unattended Wireless Sensor Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close