Secure Range Queries in Tiered Sensor Networks
暂无分享,去创建一个
Rui Zhang | Yanchao Zhang | Jing Shi | Yanchao Zhang | Rui Zhang | Jing Shi
[1] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[2] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[3] Prashant J. Shenoy,et al. Rethinking Data Management for Storage-centric Sensor Networks , 2007, CIDR.
[4] Bo Sheng,et al. Data storage placement in sensor networks , 2006, MobiHoc '06.
[5] Qun Li,et al. Verifiable Privacy-Preserving Range Query in Sensor Networks , 2006 .
[6] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[7] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[8] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[9] Bo Sheng,et al. Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[11] Peter Desnoyers,et al. TSAR: a two tier sensor storage architecture using interval skip graphs , 2005, SenSys '05.
[12] Yuguang Fang,et al. Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[14] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[15] Young-Jin Kim,et al. Multi-dimensional range queries in sensor networks , 2003, SenSys '03.
[16] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[17] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.
[18] Deborah Estrin,et al. The Tenet architecture for tiered sensor networks , 2006, SenSys '06.
[19] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[20] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[21] Zinaida Benenson,et al. Access control in wireless sensor networks , 2008 .
[22] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[23] Yuguang Fang,et al. A Two-Layer Key Establishment Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.