Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks
暂无分享,去创建一个
[1] Salah A. Aly,et al. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.
[2] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[3] Roberto Di Pietro,et al. Confidentiality and integrity for data aggregation in WSN using peer monitoring , 2009, Secur. Commun. Networks.
[4] Sang Hyuk Son,et al. Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges , 2005 .
[5] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[6] Sushil Jajodia,et al. Secure median computation in wireless sensor networks , 2009, Ad Hoc Networks.
[7] Emiliano De Cristofaro,et al. Privacy-Preserving Querying in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[8] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[9] Sushil Jajodia,et al. Attack-resilient hierarchical data aggregation in sensor networks , 2006, SASN '06.
[10] Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[11] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[12] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[13] R. Di Pietro,et al. FastRIPP: RFID Privacy Preserving protocol with Forward Secrecy and Fast Resynchronisation , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.
[14] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[15] Alex Delis,et al. Outlier-Aware Data Aggregation in Sensor Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] David Sun,et al. COUGAR: the network is the database , 2002, SIGMOD '02.
[17] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[18] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[19] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[20] Emiliano De Cristofaro,et al. Privacy-Preserving Policy-Based Information Transfer , 2009, Privacy Enhancing Technologies.
[21] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[22] Gene Tsudik,et al. QUEST Software and , 2022 .