Privacy-aware collaboration among untrusted resource constrained devices
暂无分享,去创建一个
[1] R. Ness. Influence of the HIPAA Privacy Rule on health research. , 2007, JAMA.
[2] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[3] Liqun Chen,et al. Identity based authenticated key agreement protocols from pairings , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[4] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[5] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[6] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[7] Atsuko Miyaji,et al. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.
[8] Bruce Schneier,et al. Cryptography Engineering - Design Principles and Practical Applications , 2010 .
[9] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[10] George Danezis,et al. Privacy-preserving smart metering , 2011, ISSE.
[11] David A. Wagner,et al. Analyzing internet voting security , 2004, CACM.
[12] D. Jefferson,et al. Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .
[13] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[14] Chris Hanson,et al. Amorphous computing , 2000, Commun. ACM.
[15] Mani B. Srivastava,et al. Challenges in resource monitoring for residential spaces , 2009, BuildSys '09.
[16] Richard J. Lipton,et al. Foundations of Secure Computation , 1978 .
[17] H. Vincent Poor,et al. A theory of utility and privacy of data sources , 2010, 2010 IEEE International Symposium on Information Theory.
[18] H. Y. Lam,et al. A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.
[19] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[20] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[21] Peter Schaar,et al. Privacy by Design , 2010 .
[22] Albert L. Waldo,et al. Pacemaker and ICD Generator Malfunctions: Analysis of Food and Drug Administration Annual ReportsMaisel WH, Moynahan M, Zuckerman BD, et al (Harvard Med School; US Food and Drug Administration, Rockville, Md): JAMA 295:1901–1906, 2006§ , 2007 .
[23] Amit Sahai,et al. Pseudonym Systems , 1999, Selected Areas in Cryptography.
[24] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[25] Peter R. Croll,et al. Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[26] Gregory D. Abowd,et al. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award) , 2007, UbiComp.
[27] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[28] Vipul Gupta,et al. Integrating elliptic curve cryptography into the web's security infrastructure , 2004, WWW Alt. '04.
[29] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[30] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[31] W. Maisel,et al. Pacemaker and ICD generator malfunctions: analysis of Food and Drug Administration annual reports. , 2006, JAMA.
[32] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[33] W. Maisel,et al. Pacemaker and ICD generator reliability: meta-analysis of device registries. , 2006, JAMA.
[34] David Wetherall,et al. Revisiting Smart Dust with RFID Sensor Networks , 2008, HotNets.
[35] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[36] Eric C. Larson,et al. GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home , 2010, Pervasive.
[37] M. Scott. Implementing cryptographic pairings , 2007 .
[38] Florian Kerschbaum,et al. Plug-In Privacy for Smart Metering Billing , 2010, PETS.
[39] Burton Rosenberg,et al. Handbook of Financial Cryptography and Security , 2010 .
[40] Mario Schootman,et al. Area-level poverty and preterm birth risk: A population-based multilevel analysis , 2008, BMC public health.
[41] Kevin Fu,et al. BAT: Backscatter Anything-to-Tag Communication , 2013 .
[42] Amit Sahai,et al. Computing on Encrypted Data , 2008, ICISS.
[43] Dorothy Ndedi Monekosso,et al. A review of ant algorithms , 2009, Expert Syst. Appl..
[44] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[45] Friedemann Mattern,et al. ICT for Green – How Computers Can Help Us to Conserve Energy , 2010 .
[46] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[47] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[48] Magdalena Balazinska,et al. Longitudinal study of a building-scale RFID ecosystem , 2009, MobiSys '09.
[49] Alanson P. Sample,et al. Design of an RFID-Based Battery-Free Programmable Sensing Platform , 2008, IEEE Transactions on Instrumentation and Measurement.
[50] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[51] Yuval Ishai,et al. Secure Arithmetic Computation with No Honest Majority , 2008, IACR Cryptol. ePrint Arch..
[52] Luca Maria Gambardella,et al. Ant Algorithms for Discrete Optimization , 1999, Artificial Life.
[53] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[54] Sanjit Chatterjee,et al. On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited , 2011, Discret. Appl. Math..
[55] Deepak Ganesan,et al. Flit: a bulk transmission protocol for RFID-scale sensors , 2012, MobiSys '12.
[56] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[57] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[58] Adam Dunkels,et al. A database in every sensor , 2011, SenSys.
[59] Christof Paar,et al. Privacy Preserving Payments on Computational RFID Devices with Application in Intelligent Transportation Systems , 2012, RFIDSec.
[60] Kevin Fu,et al. CCCP: Secure Remote Storage for Computational RFIDs , 2009, USENIX Security Symposium.
[61] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[62] Moni Naor,et al. Non-malleable cryptography , 1991, STOC '91.
[63] Elaine Shi,et al. Privacy-Preserving Stream Aggregation with Fault Tolerance , 2012, Financial Cryptography.
[64] Jean J. Labrosse,et al. MicroC/OS-II: The Real Time Kernel , 1998 .
[65] Michael Scott,et al. Implementing Cryptographic Pairings on Smartcards , 2006, CHES.
[66] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[67] Alexander Hinneburg,et al. DENCLUE 2.0: Fast Clustering Based on Kernel Density Estimation , 2007, IDA.
[68] Shyam Sadasivan. An Introduction to the ARM Cortex-M3 Processor , 2006 .
[69] Tatsuaki Okamoto,et al. Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations , 1997, CRYPTO.
[70] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[71] Chun Zhang,et al. Storing and querying ordered XML using a relational database system , 2002, SIGMOD '02.
[72] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[73] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[74] Paulo S. L. M. Barreto,et al. Efficient pairing computation on supersingular Abelian varieties , 2007, IACR Cryptol. ePrint Arch..
[75] Prashant J. Shenoy,et al. Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers , 2012, Financial Cryptography.
[76] John Shawe-Taylor,et al. Advances in Intelligent Data Analysis VII, 7th International Symposium on Intelligent Data Analysis, IDA 2007, Ljubljana, Slovenia, September 6-8, 2007, Proceedings , 2007, IDA.
[77] Ricardo Dahab,et al. Implementing Cryptographic Pairings over Barreto-Naehrig Curves , 2007, Pairing.
[78] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[79] D·范威尼,et al. Real-time kernel , 2009 .
[80] David E. Culler,et al. Design and implementation of a high-fidelity AC metering network , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[81] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[82] Jan Camenisch,et al. Anonymous credentials on a standard java card , 2009, CCS.
[83] Morris J. Dworkin,et al. SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .
[84] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[85] Kimberley Lamarche,et al. Take the Challenge: Strategies to Improve Support for Parents of Chronically Ill Children , 2012, Home healthcare nurse.
[86] M. Panella. Associate Editor of the Journal of Computer and System Sciences , 2014 .
[87] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[88] Elaine Shi,et al. Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.
[89] Piotr Indyk,et al. Efficient and reliable low-power backscatter networks , 2012, CCRV.
[90] David Wetherall,et al. A software radio-based UHF RFID reader for PHY/MAC experimentation , 2011, 2011 IEEE International Conference on RFID.
[91] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[92] Benjamin Ransford,et al. Moo : A Batteryless Computational RFID and Sensing Platform , 2011 .
[93] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[94] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[95] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[96] Dan Suciu,et al. The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.
[97] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[98] Carmela Troncoso,et al. PrETP: Privacy-Preserving Electronic Toll Pricing , 2010, USENIX Security Symposium.
[99] I. G. R. J. Roker. A real-time operating system , 1986 .
[100] Bruce M. Kapron,et al. Fast asynchronous byzantine agreement and leader election with full information , 2008, SODA '08.
[101] David Wetherall,et al. Recognizing daily activities with RFID-based sensors , 2009, UbiComp.
[102] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[103] Vinod Vaikuntanathan,et al. Computing Blindfolded: New Developments in Fully Homomorphic Encryption , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[104] Matt Brown,et al. Invited talk , 2007 .
[105] Annett Baier. Selected Areas in Cryptography , 2005, Lecture Notes in Computer Science.
[106] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[107] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[108] Kevin Fu,et al. HICCUPS: health information collaborative collection using privacy and security , 2009, SPIMACS '09.
[109] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[110] Alfred Menezes,et al. Software Implementation of the NIST Elliptic Curves Over Prime Fields , 2001, CT-RSA.
[111] George Danezis,et al. Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.
[112] E. Lawrence. Microgrids and Heterogeneous Power Quality and Reliability , 2008 .
[113] Suman Nath,et al. Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.
[114] Ola Pettersson,et al. ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..
[115] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[116] David Blaauw,et al. Near-Threshold Computing: Reclaiming Moore's Law Through Energy Efficient Integrated Circuits , 2010, Proceedings of the IEEE.
[117] L. Biel,et al. ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).
[118] Dimitrios Gunopulos,et al. Automatic Subspace Clustering of High Dimensional Data , 2005, Data Mining and Knowledge Discovery.
[119] Elaine Shi,et al. GUPT: privacy preserving data analysis made easy , 2012, SIGMOD Conference.
[120] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[121] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[122] S. Ramamurthy,et al. Passive tag-to-tag communication , 2012, 2012 IEEE International Conference on RFID (RFID).
[123] Paul Francis,et al. Towards Statistical Queries over Distributed Private User Data , 2012, NSDI.
[124] Aaron Roth,et al. Privately releasing conjunctions and the statistical query barrier , 2010, STOC '11.
[125] Dong Chao,et al. Universal Software Radio Peripheral , 2010 .
[126] Elias Leake Quinn,et al. Smart Metering and Privacy: Existing Laws and Competing Policies , 2009 .
[127] Geoff Mulligan,et al. The 6LoWPAN architecture , 2007, EmNets '07.