A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs
暂无分享,去创建一个
[1] Sanjay Kumar Madria,et al. Distributed Attribute Based Access Control of Aggregated Data in Sensor Clouds , 2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).
[2] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[3] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[4] S. Peter,et al. On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .
[5] Qinghua Li,et al. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.
[6] Sanjay Kumar Madria,et al. Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis , 2009, 2012 IEEE 13th International Conference on Mobile Data Management.
[7] Sanjay Kumar Madria,et al. PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[8] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[9] Devesh C. Jinwala,et al. Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[10] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[11] Mohammed Feham,et al. Fast and secure implementation of ECC-based concealed data aggregation in WSN , 2013, Global Information Infrastructure Symposium - GIIS 2013.
[12] J. Pollard,et al. Monte Carlo methods for index computation () , 1978 .
[13] Jiankun Hu,et al. An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography , 2009, 2009 Third International Conference on Network and System Security.
[14] Li Li,et al. Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images , 2012, Signal Process..
[15] Dirk Westhoff,et al. Malleability resilient (premium) Concealed Data Aggregation , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[16] Aldar C.-F. Chan,et al. Concealed Data Aggregation for Wireless Sensor Networks , 2009 .
[17] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.
[18] Xiaotie Deng,et al. TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[19] Gene Tsudik,et al. QUEST Software and , 2022 .
[20] Hung-Min Sun,et al. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[21] Ivan Stojmenovic,et al. Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.