PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing
暂无分享,去创建一个
[1] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[2] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[3] Nicholas Hopper,et al. Combating Double-Spending Using Cooperative P2P Systems , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[4] Yang Yu,et al. Query privacy in wireless sensor networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[5] Ramachandran Ramjee,et al. Nericell: using mobile smartphones for rich monitoring of road and traffic conditions , 2008, SenSys '08.
[6] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[7] Ioannis Krontiris,et al. Monetary incentives in participatory sensing using multi-attributive auctions , 2012, Int. J. Parallel Emergent Distributed Syst..
[8] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[9] Kui Ren,et al. Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] Tassos Dimitriou,et al. Privacy preservation schemes for querying wireless sensor networks , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[11] Kwangjo Kim,et al. Advances in Cryptology — ASIACRYPT '96 , 1996, Lecture Notes in Computer Science.
[12] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[13] Claudio Soriente,et al. Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure , 2011, WiSec '11.
[14] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[15] Masayuki Abe,et al. How to Date Blind Signatures , 1996, ASIACRYPT.
[16] Felix C. Freiling,et al. Integrating people-centric sensing with social networks: A privacy research agenda , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[17] Ernest F. Brickell,et al. Advances in Cryptology — CRYPTO’ 92 , 2001, Lecture Notes in Computer Science.
[18] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[19] Ramachandran Ramjee,et al. Nericell: rich monitoring of road and traffic conditions using mobile smartphones , 2008, SenSys '08.
[20] Minho Shin,et al. AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..
[21] Matthias Stevens,et al. Participatory noise pollution monitoring using mobile phones , 2010, Inf. Polity.
[22] Ramachandran Ramjee,et al. PRISM: platform for remote sensing using smartphones , 2010, MobiSys '10.
[23] Shivakant Mishra,et al. Fusing mobile, sensor, and social data to fully enable context-aware computing , 2010, HotMobile '10.
[24] Eric A. Brewer,et al. N-smarts: networked suite of mobile atmospheric real-time sensors , 2008, NSDR '08.
[25] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[26] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallet with Observers , 2002 .
[27] Emiliano De Cristofaro,et al. Privacy-Preserving Querying in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[28] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.