A Perturbed Compressed Sensing based Authentication Mechanism in Multi-hop Wireless Sensor Networks
暂无分享,去创建一个
Feng Huang | Jie Hao | Xiangping Zhai | Xiaoming Yuan | Hui Huang | Chunlong Li | Jie Hao | Xiaoming Yuan | X. Zhai | Feng Huang | Chunlong Li | Hui Huang
[1] Jing Zhai,et al. Study of Wireless Authentication Center with Mixed Encryption in WSN , 2016, J. Sensors.
[2] Sen Bai,et al. A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud , 2017, Inf. Sci..
[3] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[4] Akram Aldroubi,et al. Perturbations of measurement matrices and dictionaries in compressed sensing , 2012 .
[5] Riccardo Rovatti,et al. Submitted to Ieee Transactions on Signal Processing Low-complexity Multiclass Encryption by Compressed Sensing Part I: Definition and Main Properties , 2022 .
[6] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[7] G. Sharma,et al. On the security and robustness of encryption via compressed sensing , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[8] Xiaohui Yuan,et al. An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.
[9] Robert H. Deng,et al. Practical ID-based encryption for wireless sensor network , 2010, ASIACCS '10.
[10] Thomas Strohmer,et al. General Deviants: An Analysis of Perturbations in Compressed Sensing , 2009, IEEE Journal of Selected Topics in Signal Processing.
[11] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[12] Jun Sun,et al. Compressive data gathering for large-scale wireless sensor networks , 2009, MobiCom '09.
[13] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[14] Sajal K. Das,et al. Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .
[15] David K. Y. Yau,et al. A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks , 2017, ACM Trans. Sens. Networks.
[16] Xue Liu,et al. Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory Recovery , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[17] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[18] Wenjun Zeng,et al. A Compressive Sensing Based Secure Watermark Detection and Privacy Preserving Storage Framework , 2014, IEEE Transactions on Image Processing.
[19] Stefano Tubaro,et al. A compressive-sensing based watermarking scheme for sparse image tampering identification , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[20] Cishen Zhang,et al. Robustly Stable Signal Recovery in Compressed Sensing With Structured Matrix Perturbation , 2011, IEEE Transactions on Signal Processing.
[21] Kun Liu,et al. A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods , 2008, Privacy-Preserving Data Mining.
[22] Liehuang Zhu,et al. A Perturbed Compressed Sensing Protocol for Crowd Sensing , 2016, Mob. Inf. Syst..