ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Efficient Wormhole Detection and Optimal Path Selection for Secure Data Transmission in WSN Environment
Wireless Personal Communications
◽
10.1007/s11277-021-08856-8
◽
2021
◽
Author(s):
Vanita Verma
◽
Vijay Kumar Jha
Keyword(s):
Data Transmission
◽
Optimal Path
◽
Path Selection
◽
Secure Data
◽
Secure Data Transmission
◽
Selection For
Download Full-text
Related Documents
Cited By
References
New Hidden and Secure Data Transmission Method Proposal for Military IEEE 802.11 Networks
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
◽
10.1109/iihmsp.2010.52
◽
2010
◽
Author(s):
Piotrowski Zbigniew
◽
Sawicki Krzysztof
◽
Bednarczyk Mariusz
◽
Gajewski Piotr
Keyword(s):
Ieee 802.11
◽
Data Transmission
◽
Transmission Method
◽
802.11 Networks
◽
Secure Data
◽
Ieee 802.11 Networks
◽
Secure Data Transmission
Download Full-text
Cellular automata-based optimised routing for secure data transmission in wireless sensor networks
Journal of Experimental & Theoretical Artificial Intelligence
◽
10.1080/0952813x.2021.1882002
◽
2021
◽
pp. 1-19
Author(s):
Pradeep Sadashiv Khot
◽
Udaykumar Laxman Naik
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Cellular Automata
◽
Data Transmission
◽
Wireless Sensor
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
A Key Setup and a Secure Data Transmission Mechanism Based on Three-Dimensional Coordinates for Sensor Network Communication
2008 International Conference on Information Science and Security (ICISS 2008)
◽
10.1109/iciss.2008.26
◽
2008
◽
Cited By ~ 2
Author(s):
Inshil Doh
◽
Kijoon Chae
Keyword(s):
Sensor Network
◽
Data Transmission
◽
Three Dimensional
◽
Transmission Mechanism
◽
Network Communication
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Introducing secure data transmission scheme in a heterogeneous environment
2013 Third World Congress on Information and Communication Technologies (WICT 2013)
◽
10.1109/wict.2013.7113101
◽
2013
◽
Author(s):
Kun Liu
◽
Kun Ma
◽
Ajith Abraham
Keyword(s):
Data Transmission
◽
Heterogeneous Environment
◽
Transmission Scheme
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Machine Learning Based Data Security Model Using Blockchain for Secure Data Transmission in IoT
10.1109/icesc51422.2021.9532659
◽
2021
◽
Author(s):
Smitha Chowdary Ch
◽
Srilakshmi Puli
◽
Lakshmi Viveka K
◽
M.V.B.T. Santhi
Keyword(s):
Machine Learning
◽
Data Transmission
◽
Data Security
◽
Security Model
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
WSN-IoT Clustering for Secure Data Transmission in E-Health Sector using Green Computing Strategy
10.1109/citsm52892.2021.9588977
◽
2021
◽
Author(s):
Anurag Srivastava
◽
Abhishek Singh
◽
Susheel George Joseph
◽
M. Rajkumar
◽
Yogini Dilip Borole
◽
...
Keyword(s):
Data Transmission
◽
Health Sector
◽
Green Computing
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Detection of duplicated data with minimum overhead and secure data transmission for sensor big data
Cluster Computing
◽
10.1007/s10586-017-1079-x
◽
2017
◽
Vol 22
(S5)
◽
pp. 10467-10479
◽
Cited By ~ 2
Author(s):
S. Beulah
◽
F. Ramesh Dhanaseelan
Keyword(s):
Big Data
◽
Data Transmission
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Two observer approaches for synchronization of chaotic Colpitts oscillators: application to secure data transmission
Proceedings of the 45th IEEE Conference on Decision and Control
◽
10.1109/cdc.2006.377734
◽
2006
◽
Author(s):
M. L'Hernault
◽
J. De Leon-Morales
◽
J. P. Barbot
◽
A. Ouslimani
Keyword(s):
Data Transmission
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
DNA algorithm on optimal path selection for bus travel network
2009 Fourth International on Conference on Bio-Inspired Computing
◽
10.1109/bicta.2009.5338116
◽
2009
◽
Cited By ~ 3
Author(s):
Qian Zhang
◽
Enqi Xu
◽
Zhenye Wang
◽
Yafei Dong
Keyword(s):
Optimal Path
◽
Path Selection
◽
Selection For
◽
Dna Algorithm
Download Full-text
Secure Data Transmission of Smart Home Networks Based on Information Hiding
Pattern Recognition and Artificial Intelligence - Lecture Notes in Computer Science
◽
10.1007/978-3-030-59830-3_23
◽
2020
◽
pp. 264-275
Author(s):
Haiyu Deng
◽
Lina Yang
◽
Xiaocui Dang
◽
Yuan Yan Tang
◽
Patrick Wang
Keyword(s):
Data Transmission
◽
Information Hiding
◽
Smart Home
◽
Home Networks
◽
Secure Data
◽
Secure Data Transmission
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close