Transactional Confidentiality in Sensor Networks
暂无分享,去创建一个
Stephen B. Wicker | Deirdre K. Mulligan | S. Shankar Sastry | Marci Meingast | Sameer Pai | Tanya Roosta | Sergio Bermudez | S. Sastry | S. Wicker | T. Roosta | D. Mulligan | M. Meingast | S. Pai | S. Bermudez
[1] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[2] Deborah Estrin,et al. Habitat monitoring with sensor networks , 2004, CACM.
[3] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[4] Peter Thomson,et al. Real-time health monitoring of civil infrastructure systems in Colombia , 2001, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.
[5] Tarek F. Abdelzaher,et al. AIDA: Adaptive application-independent data aggregation in wireless sensor networks , 2004, TECS.
[6] Orin S. Kerr. A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it , 2003 .
[7] Deirdre K. Mulligan,et al. Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act , 2004 .
[8] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[9] John A. Stankovic,et al. ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .
[10] Dongxi Liu,et al. Normalizing traffic pattern with anonymity for mission critical applications , 2004, 37th Annual Simulation Symposium, 2004. Proceedings..