A new privacy-preserving Euclid-distance protocol and its applications in WSNs
暂无分享,去创建一个
[1] Cao Xiang-yu. Density-based Clustering Protocol for Wireless Sensor Networks , 2009 .
[2] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[3] Shundong Li,et al. Secure Two-Party Computational Geometry , 2005, Journal of Computer Science and Technology.
[4] Li Jiang-hua. A Protocol for Privacy-Preserving Closest-Pair of Points , 2008 .
[5] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[6] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[7] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[8] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[9] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[10] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[11] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[12] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[13] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[14] Zhong Hong,et al. Protocol for privacy-preserving space closest-pair of points , 2011 .
[15] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[16] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.