Classify Encrypted Data in Wireless Sensor Networks
End-to-end security mechanisms, like SSL, may seriously limit the capability of in-network processing that is the most critical function in sensor networks. Supporting in-network processing can significantly improve the performance of extremely resource-constrained sensor networks featuring many-to-...
Saved in:
Main Authors: | WU, Yongdong, MA, Di, LI, Tieyan, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2004
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/532 http://dx.doi.org/10.1109/VETECF.2004.1404660 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Practical ID-based encryption for wireless sensor network
by: CHU, Cheng-Kang, et al.
Published: (2010) -
Compliant Encryption of JPEG2000 Codestreams
by: WU, Yongdong, et al.
Published: (2004) -
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
by: LI, Tieyan, et al.
Published: (2004) -
Dynamic Access Control for Multi-Privileged Group Communications
by: MA, Di, et al.
Published: (2004) -
Protecting Group Dynamic Information in Large Scale Multicast Groups
by: WU, Yongdong, et al.
Published: (2005)