Efficient and privacy-preserving data aggregation in mobile sensing
暂无分享,去创建一个
[1] Qinghua Li,et al. A routing protocol for socially selfish delay tolerant networks , 2012, Ad Hoc Networks.
[2] Claudio Soriente,et al. Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure , 2011, WiSec '11.
[3] Elaine Shi,et al. Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.
[4] Sheng Zhong,et al. Privacy-Preserving Classification of Customer Data without Loss of Accuracy , 2005, SDM.
[5] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[6] Sivan Toledo,et al. VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.
[7] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Qinghua Li,et al. Mitigating Routing Misbehavior in Disruption Tolerant Networks , 2012, IEEE Transactions on Information Forensics and Security.
[9] David W. McDonald,et al. Activity sensing in the wild: a field trial of ubifit garden , 2008, CHI.
[10] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[11] Elaine Shi,et al. Privacy-Preserving Stream Aggregation with Fault Tolerance , 2012, Financial Cryptography.
[12] Gene Tsudik,et al. QUEST Software and , 2022 .
[13] Florian Kerschbaum,et al. Fault-Tolerant Privacy-Preserving Statistics , 2012, Privacy Enhancing Technologies.
[14] Emiliano Miluzzo,et al. The BikeNet mobile sensing system for cyclist experience mapping , 2007, SenSys '07.
[15] Mihir Bellare,et al. New Proofs for NMAC and HMAC: Security without Collision Resistance , 2006, Journal of Cryptology.
[16] Claude Castelluccia,et al. I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.
[17] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[18] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[19] Andrew T. Campbell,et al. Bewell: A smartphone application to monitor, model and promote wellbeing , 2011, PervasiveHealth 2011.
[20] Jacques Stern,et al. Sharing Decryption in the Context of Voting or Lotteries , 2000, Financial Cryptography.
[21] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[22] Rui Zhang,et al. PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[23] Emiliano Miluzzo,et al. BikeNet: A mobile sensing system for cyclist experience mapping , 2009, TOSN.
[24] Qinghua Li,et al. Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[25] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[26] Deborah Estrin,et al. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.
[27] Suman Nath,et al. Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.
[28] Adam J. Lee,et al. Secured histories: computing group statistics on encrypted data while preserving individual privacy , 2010, ArXiv.
[29] M. Apte,et al. INDOOR CARBON DIOXIDE CONCENTRATIONS AND SBS IN OFFICE WORKERS , 2000 .
[30] Deborah Estrin,et al. AndWellness: an open mobile system for activity and experience sampling , 2010, Wireless Health.