Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks
暂无分享,去创建一个
Geng Yang | Xun Yi | Min Wang | Jingjing Bao | Hua Dai
[1] Erol Gelenbe,et al. Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.
[2] Geng Yang,et al. VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks , 2016, Int. J. Distributed Sens. Networks.
[3] CHATLA. LEELA SHANKAR,et al. Privacy-and Integrity-Preserving Range Queries in Sensor Networks , 2014 .
[4] Li Ma,et al. Privacy-preserving MAX/MIN Aggregation in Wireless Sensor Networks , 2012 .
[5] Burkhard Stiller,et al. Secure and Efficient Wireless Sensor Networks , 2015, ERCIM News.
[6] XueSong Wang,et al. Superresolution Polarimetric ISAR Imaging Based on 2D CP-GTD Model , 2015, J. Sensors.
[7] Wenbo He,et al. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Geng Yang,et al. Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks , 2016, J. Sensors.
[9] Deying Li,et al. Achieving efficient and secure range query in two-tiered wireless sensor networks , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[10] Hong Chen,et al. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks† , 2014, Sensors.
[11] Erol Gelenbe,et al. Top-k query result completeness verification in sensor networks , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[12] Xi Fang,et al. Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Computational Complexity and Efficient Approximations , 2012, IEEE Transactions on Mobile Computing.
[13] Songwu Lu,et al. Design and Implementation of Cross-Domain Cooperative Firewall , 2007, 2007 IEEE International Conference on Network Protocols.
[14] Wen-Guey Tzeng,et al. An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.
[15] Chun-Shien Lu,et al. Privacy- and integrity-preserving range query in wireless sensor networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[16] Hong Chen,et al. SEMR: Secure and Efficient Multi-dimensional Range Query Processing in Two-tiered Wireless Sensor Networks , 2015, WAIM.
[17] Sy-Yen Kuo,et al. PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks , 2014, 2014 IEEE 33rd International Symposium on Reliable Distributed Systems.
[18] Deborah Estrin,et al. The Tenet architecture for tiered sensor networks , 2006, SenSys '06.
[19] Rui Li,et al. A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.
[20] Alex X. Liu,et al. Collaborative enforcement of firewall policies in virtual private networks , 2008, PODC '08.
[21] Ke Wang,et al. A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks , 2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).
[22] Naixue Xiong,et al. Privacy-preserving max/min query in two-tiered wireless sensor networks , 2013, Comput. Math. Appl..
[23] Levent Ertaul,et al. Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs) , 2007, ICWN.
[24] Chun-Shien Lu,et al. SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks , 2017, Comput. Commun..
[25] Geng Yang,et al. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks , 2016, Sensors.
[26] Geng Yang,et al. Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks , 2015, KSII Trans. Internet Inf. Syst..
[27] Hong Song,et al. A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks , 2014, Wirel. Pers. Commun..
[28] Hong Chen,et al. Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[29] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[30] Rui Li,et al. Privacy and Integrity Preserving Top- $k$ Query Processing for Two-Tiered Sensor Networks , 2017, IEEE/ACM Transactions on Networking.
[31] Jianzhong Li,et al. Privacy-preserving and secure top-k query in two-tier wireless sensor network , 2012, GLOBECOM.
[32] Jie Wu,et al. A generic distributed broadcast scheme in ad hoc wireless networks , 2004, IEEE Transactions on Computers.
[33] Jörg Sander,et al. A framework for spatio-temporal query processing over wireless sensor networks , 2004, DMSN '04.
[34] Geng Yang,et al. EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[35] Wei Jiang,et al. A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks , 2013, 2013 IEEE 14th International Conference on Mobile Data Management.
[36] Rui Zhang,et al. Secure Top- $k$ Query Processing in Unattended Tiered Sensor Networks , 2014, IEEE Transactions on Vehicular Technology.