Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks
暂无分享,去创建一个
[1] Marco Gruteser,et al. USENIX Association , 1992 .
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[5] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[6] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[7] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[8] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[9] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[10] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[11] Marco Gruteser,et al. Privacy-Aware Location Sensor Networks , 2003, HotOS.
[12] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[13] Traian Marius Truta,et al. Protection : p-Sensitive k-Anonymity Property , 2006 .
[14] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[15] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[16] T. Truta,et al. EXTENDED P-SENSITIVE K-ANONYMITY , 2006 .
[17] Periklis Andritsos,et al. Software clustering based on information loss minimization , 2003, 10th Working Conference on Reverse Engineering, 2003. WCRE 2003. Proceedings..
[18] T. Newe,et al. Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[19] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[20] Rajeev Motwani,et al. Anonymizing Tables , 2005, ICDT.
[21] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[22] Stephan Olariu,et al. On providing anonymity in wireless sensor networks , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..
[23] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[24] Peter Kruus,et al. CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .
[25] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[26] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[27] Latanya Sweeney,et al. Datafly: A System for Providing Anonymity in Medical Data , 1997, DBSec.
[28] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.