Watermaking three-dimensional polygonal models
MULTIMEDIA '97 Proceedings of the fifth ACM international conference on Multimedia
Robust IP watermarking methodologies for physical design
DAC '98 Proceedings of the 35th annual Design Automation Conference
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Intellectual property protection by watermarking combinational logic synthesis solutions
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Robust FPGA intellectual property protection through multiple small watermarks
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Effective iterative techniques for fingerprinting design IP
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
An activity-based mobility model and location management simulation framework
MSWiM '99 Proceedings of the 2nd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Forensic engineering techniques for VLSI CAD tools
Proceedings of the 37th Annual Design Automation Conference
Publicly detectable techniques for the protection virtual components
Proceedings of the 38th annual Design Automation Conference
Honeypots: Tracking Hackers
DRM: doesn't really mean digital copyright management
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Experience with software watermarking
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Robust Watermarking of Polygonal Meshes
GMP '00 Proceedings of the Geometric Modeling and Processing 2000
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Robust spread-spectrum audio watermarking
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
IP protection of DSP algorithms for system on chip implementation
IEEE Transactions on Signal Processing
Information Systems Frontiers
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
The actual deployment of the majority of envisioned applications for sensor networks is crucially dependent on resolving associated security, privacy, and digital rights management (DRM) issues. Although cryptography, security, and DRM have been active research topics for the last several decades, wireless sensor networks (WSN) pose a new system of conceptual, technical, and optimization challenges.In this Chapter we survey two areas related to security in WSN. First, we briefly survey techniques for the protection of the routing infrastructure at the network level for mobile multi-hop (ad-hoc) networks. Secondly, we discuss the first-known watermarking technique for authentication of sensor network data and information. We conclude the Chapter by providing a short discussion of future research and development directions in security and privacy in sensor networks.