SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks
暂无分享,去创建一个
Feng Xia | Chun Chen | Jiajun Bu | Daojing He | Mingjian Yin
[1] Deborah Estrin,et al. Data-centric storage in sensornets , 2003, CCRV.
[2] Alex X. Liu,et al. SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Bo Sheng,et al. Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[4] Alex X. Liu,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Privacy- and Integrity-Preserving Range Queries in Sensor Networks , 2022 .
[5] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[6] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[7] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[8] Daojing He,et al. Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[9] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[10] Zinaida Benenson,et al. Access control in wireless sensor networks , 2008 .
[11] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[12] Yuguang Fang,et al. A Two-Layer Key Establishment Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[13] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[14] H. Hötzl,et al. Detection of subsurface flow phenomena , 1989 .
[15] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[16] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[17] Chun Chen,et al. Distributed privacy-preserving access control in a single-owner multi-user sensor network , 2011, 2011 Proceedings IEEE INFOCOM.
[18] Peter Desnoyers,et al. Ultra-low power data storage for sensor networks , 2006, 2006 5th International Conference on Information Processing in Sensor Networks.
[19] Rui Zhang,et al. Secure Range Queries in Tiered Sensor Networks , 2009, IEEE INFOCOM 2009.
[20] Rui Zhang,et al. Secure multidimensional range queries in sensor networks , 2009, MobiHoc '09.
[21] Peter Desnoyers,et al. PRESTO: A Predictive Storage Architecture for Sensor Networks , 2005, HotOS.
[22] Dimitris Sacharidis,et al. Partially materialized digest scheme: an efficient verification method for outsourced databases , 2008, The VLDB Journal.
[23] Kyriakos Mouratidis,et al. Scalable Verification for Outsourced Dynamic Databases , 2009, Proc. VLDB Endow..
[24] Songwu Lu,et al. Design and Implementation of Cross-Domain Cooperative Firewall , 2007, 2007 IEEE International Conference on Network Protocols.
[25] Douglas Comer,et al. Ubiquitous B-Tree , 1979, CSUR.
[26] Suman Nath,et al. FlashDB: Dynamic Self-tuning Database for NAND Flash , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[27] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[28] Chun Chen,et al. An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.
[29] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.