Citation to this article as recorded by
Gao, A., W. Wei and X. Xiao, 2010. Multiple hash Sub-chains: Authentication for the hierarchical sensor networks. Inform. Technol. J., 9: 740-748. CrossRef |
Li, C.H., Z.M. Lu and Y.X. Su, 2011. Reversible data hiding for btc-compressed Images based on bitplane flipping and histogram shifting of mean tables. Inform. Technol. J., 10: 1421-1426. CrossRef |
Qiao, B.M., B. Zhou, X.L. Yang, W. Wei and R. Liu, 2010. Improved DV-HOP localization based on better weighted Least-square method. Inform. Technol. J., 9: 1172-1177. CrossRefDirect Link |
Shan, L.Q., W. Wei and Y. Liu, 2010. Customizable WEB UI of based on templates Inform. Technol. J., 9: 1677-1681. CrossRefDirect Link |
Wei, W., B. Zhou, A. Gao and Y. Mei, 2010. A new approximation to information fields in sensor nets. Inform. Technol. J., 9: 1415-1420. CrossRefDirect Link |
Citation to this article as recorded by
Improved DV-HOP Localization Based on Better Weighted Least-Square Method Information Technology Journal Vol. 9, Issue 6, 1172, 2010 |
A New Approximation to Information Fields in Sensor Nets Information Technology Journal Vol. 9, Issue 7, 1415, 2010 |
Customizable WEB UI of Based On Templates Information Technology Journal Vol. 9, Issue 8, 1677, 2010 |
Multiple Hash Sub-Chains: Authentication for the Hierarchical Sensor Networks Information Technology Journal Vol. 9, Issue 4, 740, 2010 |
Reversible Data Hiding for Btc-compressed Images Based on Bitplane Flipping and Histogram Shifting of Mean Tables Information Technology Journal Vol. 10, Issue 7, 1421, 2011 |
How to cite this article
Xiangrong Xiao, Xingming Sun, Xinbing Wang and Lei Rao, 2009. DOSM: A Data-Oriented Security Model Based on Information Hiding in WSNs. Information Technology Journal, 8: 678-687.
DOI: 10.3923/itj.2009.678.687
URL: https://scialert.net/abstract/?doi=itj.2009.678.687
DOI: 10.3923/itj.2009.678.687
URL: https://scialert.net/abstract/?doi=itj.2009.678.687