Privacy preservation for WSN: A Survey
暂无分享,去创建一个
[1] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[2] Jian Ren,et al. Providing Source-Location Privacy in Wireless Sensor Networks , 2009, WASA.
[3] Daniel Minoli,et al. Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .
[4] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[5] Jian Ren,et al. Routing-based source-location privacy protection in wireless sensor networks , 2009, 2009 IEEE International Conference on Electro/Information Technology.
[6] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[7] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[8] Jianying Zhou,et al. Wireless Sensor Network Security , 2008 .
[9] Jian Ren,et al. Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[10] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[11] Basel Alomair,et al. Statistical Framework for Source Anonymity in Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[12] Marco Gruteser,et al. Privacy-Aware Location Sensor Networks , 2003, HotOS.
[13] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..
[14] Kui Ren,et al. Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[15] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[16] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[17] Kui Ren,et al. DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.
[18] Shivakant Mishra,et al. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.
[19] Wenyuan Xu,et al. Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[20] Hu Yan-jun. Wireless Sensor Network Technology , 2006 .
[21] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[22] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[23] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[24] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[25] Edith C. H. Ngai. On providing sink anonymity for sensor networks , 2009, IWCMC.
[26] Wenyuan Xu,et al. Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.
[27] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).