A Review of Privacy Preserving Techniques in Wireless Sensor Network
暂无分享,去创建一个
[1] Arshad Jhumka,et al. Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[2] A. Gurjar,et al. Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[3] Nitin H. Vaidya,et al. A new ‘Direction’ for source location privacy in wireless sensor networks' , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[4] Jianfeng Ma,et al. Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[5] Yeonghwan Tscha. Routing for enhancing source-location privacy in wireless sensor networks of multiple assets , 2009, Journal of Communications and Networks.
[6] Guangjun Wen,et al. Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[7] Rabindra Bista,et al. Achieving Scalable Privacy Preserving Data Aggregation for Wireless Sensor Networks , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[8] Jian Ren,et al. Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[9] Petros Spachos,et al. Opportunistic routing for enhanced source-location privacy in wireless sensor networks , 2010, 2010 25th Biennial Symposium on Communications.
[10] Jian Ren,et al. Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[11] Jian Ren,et al. Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[12] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[13] Jianbo Yao,et al. Preserving Mobile-Sink-Location Privacy in Wireless Sensor Networks , 2010, 2010 2nd International Workshop on Database Technology and Applications.
[14] Guangjun Wen,et al. Protecting Classification Privacy Data Aggregation in Wireless Sensor Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[15] Nitin Gupta,et al. Application based Study on Wireless Sensor Network , 2011 .
[16] Sanjay Kumar Madria,et al. PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[17] Miao Xu,et al. Content-Aware Data Dissemination for Enhancing Privacy and Availability in Wireless Sensor Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[18] Prakhar Gupta,et al. Privacy preservation for WSN: A Survey , 2012 .
[19] Alexis Olivereau,et al. Sensor and Data Privacy in Industrial Wireless Sensor Networks , 2011, 2011 Conference on Network and Information Systems Security.
[20] S. Sivashankari,et al. A framework of trust management on location privacy and minimising the error rate in wireless sensor networks , 2013, 2013 International Conference on Optical Imaging Sensor and Security (ICOSS).
[21] M. Kumar,et al. Cluster based Location privacy in Wireless Sensor Networks against a universal adversary , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[22] Yun Li,et al. Routing-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[23] Heejo Lee,et al. Network Level Privacy for Wireless Sensor Networks , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[24] Petros Spachos,et al. Improving source-location privacy through opportunistic routing in wireless sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[25] Ming Gu,et al. Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.