Efficient spatial privacy preserving scheme for sensor network
暂无分享,去创建一个
[1] Duncan S. Wong,et al. Linkable and Anonymous Signature for Ad Hoc Groups , 2004 .
[2] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[3] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[4] Brijesh Kumar Chaurasia,et al. Maximising anonymity of a vehicle , 2010, Int. J. Auton. Adapt. Commun. Syst..
[5] Xiaodong Lin,et al. TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.
[6] Sencun Zhu,et al. Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.
[7] Maxim Raya,et al. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks , 2009, SecureComm.
[8] Joseph K. Liu,et al. Linkable Ring Signatures: Security Models and New Schemes , 2005, ICCSA.
[9] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[10] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[11] Kui Ren,et al. Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[12] Faramarz Fekri,et al. A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[13] S. Verma,et al. Maximizing anonymity of a vehicle , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.
[14] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[15] Joseph K. Liu,et al. Separable Linkable Threshold Ring Signatures , 2004, INDOCRYPT.
[16] Wenyuan Xu,et al. Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[17] Guihua Zeng,et al. Improved Threshold Ring Signature for Ad-Hoc Group , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[18] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[19] Wei-hong Wang,et al. Design and implementation of an ECDSA-based identity authentication protocol on WSN , 2009, 2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.
[20] Mohamed Abid,et al. RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.
[21] Jian Ren,et al. Preserving Source-Location Privacy in Wireless Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[22] Chunguang Ma,et al. A survey of ring signature , 2008 .
[23] Kui Ren,et al. DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.
[24] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[25] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[26] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[27] Zheng-hua Qi,et al. An ID-based ring signcryption scheme for wireless sensor networks , 2010 .
[28] Brijesh Kumar Chaurasia,et al. Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks , 2009, Trans. Comput. Sci..
[29] Jacques Stern,et al. Threshold Ring Signatures and Applications to Ad-hoc Groups , 2002, CRYPTO.
[30] Young-Koo Lee,et al. EDPPS: An Energy-efficient Data Privacy Protection Scheme for wireless sensor networks , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[31] Jacques Stern,et al. Threshold Ring Signatures for Ad-hoc Groups , 2002, CRYPTO 2002.