Cryptograpy and steganography are the two popular methods available to provide security. One hides the existence of the message and the other distorts the message itself. Using cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper focuses on the strength of combining cryptography and stegnography methods to enhance the security of communication over an open channel. Some security research in Mobile Ad Hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) is very closely related to cryptography. There are numerous security routing protocols and key management schemes that have be...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...
Abstract- The work relates the area of Stegenography, network protocols and security for data hiding...
International audienceA wireless sensor network (WSN) typically consists of base stations and a larg...
International audienceA wireless sensor network (WSN) typically consists of base stations and a larg...
Abstract. A wireless sensor network (WSN) typically consists of base stations and a large number of ...
Abstract: This paper is a combined contribution to the field of steganography and ad-hoc networks. ...
Abstract- confidentiality and security to the data is actually provided by an authentication. Authen...
In this paper, characteristics of Wireless Sensor Networks (WSN), along with problems and security i...
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vul...
Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physic...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract- Steganography is a technique for the secure transmission of data over the network. In this...
Network Security & Cryptography is a concept to protect network and data transmission over wireless ...
Abstract In a wireless sensor network environment, a sensor node is extremely constrained in terms o...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...
Abstract- The work relates the area of Stegenography, network protocols and security for data hiding...
International audienceA wireless sensor network (WSN) typically consists of base stations and a larg...
International audienceA wireless sensor network (WSN) typically consists of base stations and a larg...
Abstract. A wireless sensor network (WSN) typically consists of base stations and a large number of ...
Abstract: This paper is a combined contribution to the field of steganography and ad-hoc networks. ...
Abstract- confidentiality and security to the data is actually provided by an authentication. Authen...
In this paper, characteristics of Wireless Sensor Networks (WSN), along with problems and security i...
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vul...
Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physic...
Abstract: Because wireless sensor networks usually operate on unattended mode in hostile environment...
Abstract- Steganography is a technique for the secure transmission of data over the network. In this...
Network Security & Cryptography is a concept to protect network and data transmission over wireless ...
Abstract In a wireless sensor network environment, a sensor node is extremely constrained in terms o...
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraint...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...
Abstract- The work relates the area of Stegenography, network protocols and security for data hiding...