A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks
暂无分享,去创建一个
Qiang Zhou | Geng Yang | Liwen He | Geng Yang | Liwen He | Qiang Zhou
[1] Hasan Çam,et al. Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.
[2] Keith B. Frikken,et al. An efficient integrity-preserving scheme for hierarchical sensor aggregation , 2008, WiSec '08.
[3] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[4] Hung-Min Sun,et al. CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.
[5] Geng Yang,et al. Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[6] Jörg Widmer,et al. In-network aggregation techniques for wireless sensor networks: a survey , 2007, IEEE Wireless Communications.
[7] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[8] Aggelos Kiayias,et al. Exact In-Network Aggregation with Integrity and Confidentiality , 2012, IEEE Transactions on Knowledge and Data Engineering.
[9] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[10] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[11] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[12] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[13] Yixian Yang,et al. Discrete logarithm based additively homomorphic encryption and secure data aggregation , 2011, Inf. Sci..
[14] Dirk Westhoff,et al. A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.
[15] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[16] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[17] David A. Wagner,et al. Cryptanalysis of an Algebraic Privacy Homomorphism , 2003, ISC.
[18] Dirk Westhoff,et al. Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .
[19] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[20] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[21] Liehuang Zhu,et al. An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[22] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[23] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[24] Caifen Wang,et al. Lossy data aggregation integrity scheme in wireless sensor networks , 2013, Comput. Electr. Eng..
[25] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[26] Jung Hee Cheon,et al. Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme , 2006, Inf. Process. Lett..
[27] Gene Tsudik,et al. QUEST Software and , 2022 .