Secure comparison of encrypted data in wireless sensor networks
暂无分享,去创建一个
[1] Dirk Westhoff,et al. Identity certified authentication for ad-hoc networks , 2003, SASN '03.
[2] Dirk Westhoff,et al. Zero Common-Knowledge Authentication for Pervasive Networks , 2003, Selected Areas in Cryptography.
[3] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[4] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[6] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[7] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[8] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[9] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[10] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[11] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[12] Jorma Rissanen,et al. Stochastic Complexity in Statistical Inquiry , 1989, World Scientific Series in Computer Science.
[13] J Domingo Ferrer. A PROVABLY SECURE ADDITIVE AND MULTIPLICATIVE PRIVACY HOMOMORPHISM , 2002 .
[14] S. Peter,et al. On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[17] Gultekin Özsoyoglu,et al. Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.