-
1
-
-
85066689446
-
-
J.M. Adler, W. Dai, R.L. Green, C.A. Neff, Computational details of the votehere homomorphic election system, in: ASIACRYPT 2000, Kyoto, Japan, December 2000.
-
-
-
-
2
-
-
3142716056
-
-
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Order preserving encryption for numeric data, in: Special Interest Group on Management of Data (ACM SIGMOD 2004), June 2004.
-
-
-
-
3
-
-
33744499939
-
-
M. Acharya, J. Girao, D. Westhoff, Secure comparison of encrypted data in wireless sensor networks, in: 3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05), Trentino, Italy, April 2005.
-
-
-
-
4
-
-
33749525209
-
-
C. Castelluccia, E. Mykletun, G. Tsudik, Efficient Aggregation of encrypted data in wireless sensor networks, in: 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, CA, USA, July 2005.
-
-
-
-
5
-
-
85066669540
-
-
Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003.
-
-
-
-
7
-
-
84945300542
-
-
J. Domingo-Ferrer, A provably secure additive and multiplicative privacy homomorphism, in: Information Security Conference (ISC'02), Springer LNCS, vol. 2433, 2002, pp. 471-483.
-
-
-
-
8
-
-
24144459865
-
-
J. Girao, D. Westhoff, M. Schneider, CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks, in: IEEE International Conference on Communications (ICC'05), Seoul, Korea, May 2005.
-
-
-
-
9
-
-
35048818581
-
-
N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, Cryptographic Hardware and Embedded Systems (CHES), Cambridge, MA, USA, 2004, pp. 119-132.
-
-
-
-
10
-
-
85066638682
-
-
W. Heinzelmann, Application-Specific Protocol Architectures for Wireless Networks, PhD thesis, Massachusetts Institute of Technology, 2000.
-
-
-
-
11
-
-
85066671292
-
-
J.M. Hellerstein, W. Hong, S.Madden, K. Stanek, Beyond average: Towards sophisticated sensing with queries, in: Workshop on Information Processing in Sensor Networks (IPSN'03), Palo Alto, California, USA, April 2003.
-
-
-
-
13
-
-
84978428047
-
-
S. Madden, M.J. Franklin, J. Hellerstein, W. Hong, TAG: a Tiny aggregation service for ad-hoc sensor networks, in: 5th Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.
-
-
-
-
15
-
-
85066726517
-
-
E. Mykletun, J. Girao, D. Westhoff, Re-visited: Public key based homomorphic cryptoschemes for data concealment in wireless sensor networks, in: IEEE International Conference on Communications (ICC'06), Istanbul, Turkey, June 2006.
-
-
-
-
16
-
-
85066698158
-
-
T. Okamoto, S. Uchiyama, A new Public-Key Cryptosystem as Secure as Factoring, in: Advances in Cryptology - EUROCRYPT'98, 1998, pp. 303-318.
-
-
-
-
17
-
-
84937439454
-
-
P. Paillier, Trapdooring discrete logarithms on elliptic curves over rings, in: Advances in Cryptology - ASIACRYPT'00, 2000, pp. 573-584.
-
-
-
-
20
-
-
11244354854
-
-
N. Sastry, D. Wagner, Security considerations for IEEE 802.15.4 networks, in: ACM Workshop on Wireless Security (WiSe 2004), co-located with MobiCom 2004 Conference, pp. 32-42.
-
-
-
-
21
-
-
85066722050
-
-
D. Westhoff, J. Girao, M. Acharya, Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-distribution and Routing, to appear as regular paper in IEEE Transactions on Mobile Computing, to appear.
-
-
-
-
22
-
-
0031652485
-
-
X. Zeng, R. Bagrodia, M. Gerla, GloMoSim: a library for parallel simulation of large-scale wireless networks, in: Proceedings of the 12th Workshop on Parallel and Distributed Simulation, Banff, Alberta, CA, May 1998.
-
-
-
|