Data fusion protocol with source security for sensor networks
For the source security need,a digital signature scheme with aggregate signatures,data fusion and batch verification was proposed.Based on the proposed signature scheme and the homomorphic encryption technology,a data fusion protocol with secure sources was advanced.Security analyses show that the p...
Saved in:
Main Authors: | ZHANG Peng, YU Jian-ping, LIU Hong-wei |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74645539/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
by: Rong Yue, et al.
Published: (2013-08-01) -
Packet-loss robust scalable authentication algorithm for compressed image streaming
by: Xiao-wei YI, et al.
Published: (2014-04-01) -
End-to-end cost assessment of large particle private-wire services
by: Minfeng ZHANG, et al.
Published: (2016-09-01) -
Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
by: Guoxin ZHANG
Published: (2022-10-01) -
End-to-End Call Establishment Delay Optimization
by: Cuiling Chen
Published: (2013-06-01)