Polynomial Regression Based Secure Data Aggregation for Wireless Sensor Networks
暂无分享,去创建一个
[1] Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[2] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[3] Sushil Jajodia,et al. Privacy-preserving robust data aggregation in wireless sensor networks , 2009, Secur. Commun. Networks.
[4] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[5] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[6] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[7] Yang Yu,et al. Query privacy in wireless sensor networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[8] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[9] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[10] Suat Ozdemir,et al. Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks , 2009 .
[11] David A. Wagner,et al. Cryptanalysis of an Algebraic Privacy Homomorphism , 2003, ISC.
[12] Rui Zhang,et al. PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Deva Seetharam,et al. An efficient pseudo random number generator for low-power sensor networks [wireless networks] , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[14] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.