ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Replication Schemes in Unattended Wireless Sensor Networks
2011 4th IFIP International Conference on New Technologies, Mobility and Security
◽
10.1109/ntms.2011.5721047
◽
2011
◽
Cited By ~ 1
Author(s):
D Vitali
◽
A Spognardi
◽
L V Mancini
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Related Documents
Cited By
References
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
◽
10.4108/icst.mobiquitous2009.6824
◽
2009
◽
Cited By ~ 7
Author(s):
Attila Altay Yavuz
◽
Peng Ning
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Secure and resilient scheme for data protection in unattended wireless sensor networks
2017 1st Cyber Security in Networking Conference (CSNet)
◽
10.1109/csnet.2017.8241998
◽
2017
◽
Cited By ~ 4
Author(s):
Katarzyna Kapusta
◽
Gerard Memmi
◽
Hassan Noura
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Protection
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks
2009 3rd International Conference on New Technologies, Mobility and Security
◽
10.1109/ntms.2009.5384753
◽
2009
◽
Cited By ~ 4
Author(s):
Yi Ren
◽
Vladimir Oleshchuk
◽
Frank Y. Li
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Storage
◽
Wireless Sensor
◽
Efficient Data
◽
Unattended Wireless Sensor Networks
Download Full-text
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks
annals of telecommunications - annales des télécommunications
◽
10.1007/s12243-018-0684-x
◽
2019
◽
Vol 74
(3-4)
◽
pp. 157-165
◽
Cited By ~ 7
Author(s):
Katarzyna Kapusta
◽
Gerard Memmi
◽
Hassan Noura
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Homomorphic Encryption
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Convex-Hull-Based Boundary Detection in Unattended Wireless Sensor Networks
IEEE Sensors Letters
◽
10.1109/lsens.2017.2731200
◽
2017
◽
Vol 1
(4)
◽
pp. 1-4
◽
Cited By ~ 6
Author(s):
A. Pravin Renold
◽
S. Chandrakala
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Convex Hull
◽
Boundary Detection
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks
Journal of Communications
◽
10.4304/jcm.4.11.894-901
◽
2009
◽
Vol 4
(11)
◽
Cited By ~ 7
Author(s):
Wei Ren
◽
Junge Zhao
◽
Yi Ren
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Network Coding
◽
Wireless Sensor
◽
Efficient Data
◽
Unattended Wireless Sensor Networks
Download Full-text
Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
IET Information Security
◽
10.1049/iet-ifs.2014.0267
◽
2015
◽
Vol 9
(4)
◽
pp. 223-233
◽
Cited By ~ 6
Author(s):
Amir S. Elsafrawey
◽
Emad S. Hassan
◽
Moawad I. Dessouky
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Self Healing
◽
Data Reliability
◽
Unattended Wireless Sensor Networks
Download Full-text
Implementation of data survival in unattended Wireless Sensor Networks using cryptography
IEEE Local Computer Network Conference
◽
10.1109/lcn.2010.5735841
◽
2010
◽
Author(s):
A. S. Santos Mateus
◽
Cintia Borges Margi
◽
Marcos A. Simplicio
◽
C. C. F. Pereira Geovandro
◽
Bruno Trevizan de Oliveira
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
Download Full-text
Pollination: A Data Authentication Scheme for Unattended Wireless Sensor Networks
2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
◽
10.1109/trustcom.2011.53
◽
2011
◽
Cited By ~ 5
Author(s):
Tassos Dimitriou
◽
Ahmad Sabouri
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Authentication Scheme
◽
Wireless Sensor
◽
Data Authentication
◽
Unattended Wireless Sensor Networks
Download Full-text
Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks
2015 IEEE 29th International Conference on Advanced Information Networking and Applications
◽
10.1109/aina.2015.191
◽
2015
◽
Cited By ~ 1
Author(s):
Arpan Sen
◽
Shrestha Ghosh
◽
Arinjoy Basak
◽
Harsh Parsuram Puria
◽
Sushmita Ruj
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Unattended Wireless Sensor Networks
◽
Data Survivability
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close