Privacy and integrity preserving skyline queries in tiered sensor networks
暂无分享,去创建一个
Gang Wang | Rui Li | Yaping Lin | Bo Yin | Jinguo Li | G. Wang | Yaping Lin | Jinguo Li | Rui Li | Bo Yin
[1] Feng Xia,et al. SEF: A Secure, Efficient, and Flexible Range Query Scheme in Two-Tiered Sensor Networks , 2011, Int. J. Distributed Sens. Networks.
[2] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[3] Dimitrios Gunopulos,et al. Microhash: an efficient index structure for fash-based sensor devices , 2005, FAST'05.
[4] Katja Hose,et al. A survey of skyline processing in highly distributed environments , 2011, The VLDB Journal.
[5] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] C.-S. Lu,et al. Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.
[7] Bo Sheng,et al. An Approximation Algorithm for Data Storage Placement in Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).
[8] Deborah Estrin,et al. Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table , 2003, Mob. Networks Appl..
[9] Bo Sheng,et al. Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Rupak Majumdar,et al. VCG with Communities on Random Ad Hoc Networks , 2011, Int. J. Distributed Sens. Networks.
[11] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[12] Divyakant Agrawal,et al. Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[13] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[14] Yeim-Kuan Chang,et al. Fast binary and multiway prefix searches for packet forwarding , 2007, Comput. Networks.
[15] Songwu Lu,et al. Design and Implementation of Cross-Domain Cooperative Firewall , 2007, 2007 IEEE International Conference on Network Protocols.
[16] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[17] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[18] Alex X. Liu,et al. SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[19] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[20] Rui Zhang,et al. Secure Cooperative Data Storage and Query Processing in Unattended Tiered Sensor Networks , 2012, IEEE Journal on Selected Areas in Communications.
[21] Alex X. Liu,et al. Collaborative enforcement of firewall policies in virtual private networks , 2008, PODC '08.
[22] Rui Zhang,et al. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[23] Peter Desnoyers,et al. PRESTO: A Predictive Storage Architecture for Sensor Networks , 2005, HotOS.