Secure Data Aggregation in Wireless Sensor Networks
暂无分享,去创建一个
[1] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[2] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[3] Peter Langendoerfer,et al. On Concealed Data Aggregation for WSNs , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[4] Prasun Sinha,et al. Structure-Free Data Aggregation in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[5] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[6] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[7] Alessandro Sorniotti,et al. Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey , 2007 .
[8] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[9] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[10] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[11] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[12] Bruno Dutertre,et al. Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .
[13] Jeroen Doumen,et al. Using Secret Sharing for Searching in Encrypted Data , 2004, Secure Data Management.
[14] H. Hötzl,et al. Detection of subsurface flow phenomena , 1989 .
[15] Fang Liu,et al. SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[16] Hung-Min Sun,et al. An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks , 2008, 2008 International Conference on Embedded Software and Systems.
[17] Juan Manuel González Nieto,et al. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[18] Sanjay Kumar Madria,et al. Secure hierarchical data aggregation in wireless sensor networks , 2009, WCNC.
[19] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[20] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.
[22] Krishna M. Sivalingam,et al. Data Gathering Algorithms in Sensor Networks Using Energy Metrics , 2002, IEEE Trans. Parallel Distributed Syst..
[23] Dirk Westhoff,et al. Secure comparison of encrypted data in wireless sensor networks , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[24] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[25] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[26] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[27] Johannes Gehrke,et al. Query Processing in Sensor Networks , 2003, CIDR.
[28] Sanjay Jha,et al. Wireless Sensor Networks for Battlefield Surveillance , 2006 .
[29] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[30] Dong Seong Kim,et al. A Secure Data Aggregation Scheme for Wireless Sensor Networks , 2007, ISPA Workshops.
[31] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[32] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[33] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[34] Juan Manuel González Nieto,et al. Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.
[35] Moti Yung,et al. Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.