Secure Data Aggregation Techniques for Wireless Sensor Networks: A Review
暂无分享,去创建一个
[1] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[2] Xiaomin Zhao,et al. Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks , 2017, IET Inf. Secur..
[3] Devesh C. Jinwala,et al. Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[4] K. R. Venugopal,et al. SDAMQ: Secure Data Aggregation for Multiple Queries in Wireless Sensor Networks☆ , 2016 .
[5] Chanathip Namprempre,et al. Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.
[6] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[7] Hasan Çam,et al. Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.
[8] Vishal Krishna Singh,et al. Privacy Preserving In-network Aggregation in Wireless Sensor Networks , 2016, FNC/MobiSPC.
[9] Kyung-Ah Shim,et al. A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[10] Dapeng Wu,et al. Scalable privacy-preserving big data aggregation mechanism , 2016 .
[11] Hung-Min Sun,et al. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[12] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[13] Pascal Paillier,et al. Trapdooring Discrete Logarithms on Elliptic Curves over Rings , 2000, ASIACRYPT.
[14] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[15] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[16] Mihir Bellare,et al. Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation , 2006, CCS '06.
[17] Lathies Bhasker. Genetically derived secure cluster-based data aggregation in wireless sensor networks , 2014, IET Inf. Secur..
[18] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[19] Jianfeng Ma,et al. A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.
[20] Josep Domingo-Ferrer,et al. Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios , 2012, Inf. Fusion.
[21] Rabindra Bista,et al. Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks , 2012, IEICE Trans. Inf. Syst..
[22] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.
[23] Hung-Min Sun,et al. CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.
[24] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[25] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[26] Ivan Stojmenovic,et al. Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks , 2014, Future Gener. Comput. Syst..
[27] J. Hoffstein,et al. An introduction to mathematical cryptography , 2008 .
[28] Xing Li,et al. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks , 2015, Sensors.
[29] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[30] Gene Tsudik,et al. QUEST Software and , 2022 .
[31] Min Yoon,et al. Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[32] Yang Xiao,et al. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks , 2011, Comput. Networks.
[33] Sidi-Mohammed Senouci,et al. A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography , 2015, Ad Hoc Networks.
[34] Guisheng Yin,et al. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks , 2017, Sensors.
[35] Shiming He,et al. An efficient privacy-preserving compressive data gathering scheme in WSNs , 2015, Inf. Sci..
[36] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[37] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.