Preservation of temporal privacy in body sensor networks
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. Linear wireless sensor networks: Classification and applications , 2011, J. Netw. Comput. Appl..
[2] Seyed Pooya Shariatpanahi,et al. A Dummy-Based Approach for Preserving Source Rate Privacy , 2016, IEEE Transactions on Information Forensics and Security.
[3] Ashwin Machanavajjhala,et al. Privacy-Preserving Data Publishing , 2009, Found. Trends Databases.
[4] Benjamin C. M. Fung,et al. Privacy-preserving data publishing , 2007 .
[5] David W. Bates,et al. White Paper: Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption , 2006, J. Am. Medical Informatics Assoc..
[6] Athanasios V. Vasilakos,et al. A Survey on Ambient Intelligence in Healthcare , 2013, Proceedings of the IEEE.
[7] Wenyuan Xu,et al. Temporal Privacy in Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[8] Sumit Ghosh,et al. A fundamental framework for network security , 1997 .
[9] Manjusha Pandey,et al. Privacy Provisioning in Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[10] Mor Harchol-Balter,et al. Performance Modeling and Design of Computer Systems: Contents , 2013 .
[11] Ahmad Khonsari,et al. On the Perfect Privacy: A Statistical Analysis of Network Traffic Approach , 2016, IEEE Communications Letters.
[12] A. Varga,et al. THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .
[13] Randolph D. Nelson,et al. Probability, stochastic processes, and queueing theory - the mathematics of computer performance modeling , 1995 .
[14] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[15] Wenyuan Xu,et al. Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.
[16] Parv Venkitasubramaniam,et al. Preventing Timing Analysis in Networks: A Statistical Inference Perspective , 2013, IEEE Signal Processing Magazine.
[17] Leonard Kleinrock,et al. Time Dependent Priority Queues , 1967, Oper. Res..
[18] Bart De Decker,et al. Privacy-Preserving Telemonitoring for eHealth , 2009, DBSec.
[19] Fei Hu,et al. Privacy-Preserving Telecardiology Sensor Networks: Toward a Low-Cost Portable Wireless Hardware/Software Codesign , 2007, IEEE Transactions on Information Technology in Biomedicine.
[20] Sheldon M. Ross. Introduction to Probability Models. , 1995 .
[21] Henk C. A. van Tilborg,et al. Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .
[22] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[23] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[24] Grammati E. Pantziou,et al. A k-anonymity privacy-preserving approach in wireless medical monitoring environments , 2012, Personal and Ubiquitous Computing.
[25] Hisashi Kobayashi,et al. System Modeling and Analysis: Foundations of System Performance Evaluation , 2008 .
[26] Vidya Dhamdhere,et al. A Review of Privacy Preserving Techniques in Wireless Sensor Network , 2014 .
[27] Xiaoyan Hong,et al. Effective probabilistic approach protecting sensor traffic , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.