Secure and efficient source location privacy-preserving scheme for wireless sensor networks
暂无分享,去创建一个
[1] Yuguang Fang,et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Li Xiao,et al. Maintaining source privacy under eavesdropping and node compromise attacks , 2011, 2011 Proceedings IEEE INFOCOM.
[4] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[5] Xuemin Shen,et al. Anonymous and Authenticated Routing in Multi-Hop Cellular Networks , 2009, 2009 IEEE International Conference on Communications.
[6] Jiming Chen,et al. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks , 2011, IEEE Transactions on Wireless Communications.
[7] Sencun Zhu,et al. Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, INFOCOM.
[8] Xuemin Shen,et al. Lightweight privacy-preserving routing and incentive protocol for hybrid ad hoc wireless network , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[9] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[10] Bo Sheng,et al. Privacy-aware routing in sensor networks , 2009, Comput. Networks.