Amanote Research

Amanote Research

    RegisterSign In

Aggregation-Tolerant Steganography for Data-Stream Integrity Verification

Electronics Letters - United Kingdom
doi 10.1049/el.2014.2493
Full Text
Open PDF
Abstract

Available in full text

Categories
Electronic EngineeringElectrical
Date

September 25, 2014

Authors
A. Soltani PanahR. van Schyndel
Publisher

Institution of Engineering and Technology (IET)


Related search

Searchable Encryption With Data Integrity Verification

DEStech Transactions on Engineering and Technology Research
2017English

Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks

2010English

Inconsistency-Tolerant Integrity Checking

IEEE Transactions on Knowledge and Data Engineering
Computational TheoryComputer Science ApplicationsInformation SystemsMathematics
2011English

Improved Scheme for Cluster Based Fault Tolerant Data Aggregation in Wireless Sensor Networks

ICTACT Journal on Communication Technology
2019English

Fault Tolerant Aggregation for Power System Services

2013English

Provenance Based Data Integrity Checking and Verification in Cloud Environments

PLoS ONE
Multidisciplinary
2017English

Distributed Data Aggregation in Wireless Sensor Network - With Peer Verification

2016English

Flow Updating: Fault-Tolerant Aggregation for Dynamic Networks

Journal of Parallel and Distributed Computing
Computer NetworksHardwareCommunicationsArchitectureTheoretical Computer ScienceArtificial IntelligenceSoftware
2015English

Inconsistency-Tolerant Eliminations of Integrity Violations

2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy