Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
暂无分享,去创建一个
[1] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[2] Gelareh Taban,et al. Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[5] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[6] Kui Ren,et al. Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[7] Jirí Kur,et al. Location Privacy Issues in Wireless Sensor Networks , 2008, FIDIS.
[8] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[9] Wenyuan Xu,et al. Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.
[10] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[11] Wang Ting-ting,et al. Improved group-key-management scheme for WSN , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[12] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[13] Roberto Di Pietro,et al. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks , 2006, Wirel. Networks.
[14] Noel E. O'Connor,et al. Low-Energy Symmetric Key Distribution in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[15] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[16] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[17] Qi Shi,et al. Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol , 2007, Third International Symposium on Information Assurance and Security.
[18] Shivakant Mishra,et al. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..
[19] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[20] Kenneth E. Barner,et al. Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.
[21] Peter Langendörfer,et al. In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[22] Firdous Kausar,et al. An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.
[23] Albert Levi,et al. Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks , 2014, Peer-to-Peer Netw. Appl..