Secure multidimensional range queries in sensor networks
暂无分享,去创建一个
Rui Zhang | Yanchao Zhang | Jing Shi | Yanchao Zhang | Rui Zhang | Jing Shi
[1] Peter Desnoyers,et al. TSAR: a two tier sensor storage architecture using interval skip graphs , 2005, SenSys '05.
[2] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[4] Young-Jin Kim,et al. Multi-dimensional range queries in sensor networks , 2003, SenSys '03.
[5] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[6] Leonard E. Miller,et al. Distribution of Link Distances in a Wireless Network , 2001, Journal of research of the National Institute of Standards and Technology.
[7] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[8] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[9] Fang Liu,et al. iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[10] Sencun Zhu,et al. pDCS: Security and Privacy Support for Data-Centric Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[11] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[12] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[13] Bo Sheng,et al. Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Bo Sheng,et al. Data storage placement in sensor networks , 2006, MobiHoc '06.
[16] Qun Li,et al. Verifiable Privacy-Preserving Range Query in Sensor Networks , 2006 .
[17] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.
[18] Deborah Estrin,et al. The Tenet architecture for tiered sensor networks , 2006, SenSys '06.
[19] Prashant J. Shenoy,et al. Rethinking Data Management for Storage-centric Sensor Networks , 2007, CIDR.
[20] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[21] Bo Sheng,et al. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[22] Kui Ren,et al. DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.
[23] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[24] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[25] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[26] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[27] Rui Zhang,et al. Secure Range Queries in Tiered Sensor Networks , 2009, IEEE INFOCOM 2009.