-
1
-
-
1142303699
-
Information sharing across private databases
-
R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 2003, pp. 86-97.
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
Dallas, TX USA, May 15-18
-
R. Agrawal, R. Srikan, Privacy-preserving data mining, in: Proceedings of the 2000 ACM SIGMOD on Management of Data, Dallas, TX USA, May 15-18, 2000, pp. 439-450.
-
(2000)
Proceedings of the 2000 ACM SIGMOD on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikan, R.2
-
3
-
-
0037086890
-
Wireless sensor networks: a Survey
-
Akyildiz I.F., Su W., Sankarasubramaniam Y., and Cayirci E. Wireless sensor networks: a Survey. Computer Networks 38 4 (2002) 393-422
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
48049100992
-
Query privacy in wireless sensor networks
-
18-21 June
-
B. Carbunar, Y. Yu, L. Shi, M. Pearce, V. Vasudevan, Query privacy in wireless sensor networks, in: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007 (SECON'07), 18-21 June 2007, pp. 203-212.
-
(2007)
4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007 (SECON'07)
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, L.3
Pearce, M.4
Vasudevan, V.5
-
5
-
-
0001604533
-
Blind signatures for untraceable payments
-
Springer-Verlag
-
D. Chaum, Blind signatures for untraceable payments, in: Advances in Cryptology - Crypto'82, Springer-Verlag (1983), 1982, pp. 199-203.
-
(1982)
Advances in Cryptology - Crypto'82
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
70349102063
-
FAIR: Fuzzy-based aggregation providing in-network Resilience for real-time wireless sensor networks, to appear
-
Wisec
-
E.D. Cristofaro, J. Bohli, D.Westho, FAIR: fuzzy-based aggregation providing in-network Resilience for real-time wireless sensor networks, to appear, in: Proceedings of the Second ACM Conference Wireless Network Security (Wisec), 2009.
-
(2009)
Proceedings of the Second ACM Conference Wireless Network Security
-
-
Cristofaro, E.D.1
Bohli, J.2
Westho, D.3
-
7
-
-
4544298056
-
Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks
-
Florence, Italy, 28 June-1 July
-
J. Deng, R. Han, S. Mishra, Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks, in: IEEE International Conference on Dependable Systems and Networks (DSN 2004), Florence, Italy, 28 June-1 July 2004, pp. 637-646.
-
(2004)
IEEE International Conference on Dependable Systems and Networks (DSN
, pp. 637-646
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
SecureComm, September
-
J. Deng, R. Han, S. Mishra, Countermeasures against traffic analysis attacks in wireless sensor networks, in: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm) 2005, September 2005, pp. 113-126.
-
(2005)
First International Conference on Security and Privacy for Emerging Areas in Communications Networks
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
9
-
-
32644437991
-
-
J. Deng, R. Han, S. Mishra, Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks, Pervasive and Mobile Computing Elsevier 2 (2) (2006) 159-186.
-
(2006)
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks, Pervasive and Mobile Computing Elsevier
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
11
-
-
35048820609
-
Efficient private matching and set intersection
-
M.J. Freedman, K. Nissim, B. Pinkas, Efficient private matching and set intersection, in: Advances in Cryptography, Proceedings of Eurocrypt 2004, 2004, pp. 1-19.
-
(2004)
Advances in Cryptography, Proceedings of Eurocrypt
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
Vancouver, Canada
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, Tan, Kian-Lee, Private queries in location based services: anonymizers are not necessary, in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada, 2008, pp. 121-132.
-
(2008)
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan5
Lee, K.6
-
13
-
-
85018204196
-
Anonymous usage of location-based services through spacial and temporal cloaking
-
MobiSys
-
M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spacial and temporal cloaking, in: Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 2003, pp. 31-42.
-
(2003)
Proceedings of the International Conference on Mobile Systems, Applications, and Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
14
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
May
-
W.B. He, X. Liu, H. Nguyen, K. Nahrstedt, T. Abdelzaher, PDA: privacy-preserving data aggregation in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 2045-2053.
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM
, pp. 2045-2053
-
-
He, W.B.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
15
-
-
29844458622
-
Deriving private information from randomized data
-
Z. Huang, W. Du, B. Chen, Deriving private information from randomized data, in: Proceedings of 2005 ACM SIGMOD International Conference on Management of Data (ACM SIGMOD 2005), 2005, pp. 37-48.
-
(2005)
Proceedings of 2005 ACM SIGMOD International Conference on Management of Data (ACM SIGMOD
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
16
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
May
-
Y. Jian, S.G. Chen, Z. Zhang, L. Zhang, Protecting receiver-location privacy in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 1955-1963.
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.G.2
Zhang, Z.3
Zhang, L.4
-
17
-
-
34848852681
-
Temporal privacy in wireless sensor networks
-
June
-
P. Kamat, W.Y. Xu, W. Trappe, Y.Y. Zhang, Temporal privacy in wireless sensor networks, in: Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS 2007), June 2007, pp. 23-23.
-
(2007)
Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS
, pp. 23-23
-
-
Kamat, P.1
Xu, W.Y.2
Trappe, W.3
Zhang, Y.Y.4
-
18
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
June
-
P. Kamat, Y.Y. Zhang, W. Trappe, C. Ozturk, Enhancing source-location privacy in sensor network routing, in: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), June 2005, pp. 599-608.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.Y.2
Trappe, W.3
Ozturk, C.4
-
19
-
-
33749568323
-
Workload-aware anonymization
-
K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Workload-aware anonymization, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006, pp. 277-286.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 277-286
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
20
-
-
34248181923
-
J. Gehrke, M. Venkitasubramaniam, l-Diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, in: ACM Transactions on Knowledge Discovery from Data, 1 (2007).
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
-
-
Machanavajjhala, A.1
Kifer, D.2
-
21
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
October
-
K. Mehta, D.G. Liu, M. Wright, Location privacy in sensor networks against a global eavesdropper, in: Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007), October 2007, pp. 314-323.
-
(2007)
Proceedings of the IEEE International Conference on Network Protocols (ICNP
, pp. 314-323
-
-
Mehta, K.1
Liu, D.G.2
Wright, M.3
-
22
-
-
0032074579
-
Anonymous connections and onion routing
-
M.G. Reed, P.F. Syverson, D.M. Goldschlag, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, 16 (4) (1998) 482-494.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
24
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
May
-
M. Shao, Y. Yang, S. Zhu, G. Cao, Towards statistically strong source anonymity for sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 1298-1306.
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM
, pp. 1298-1306
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
25
-
-
34548302064
-
-
M. Shao, S. Zhu, W. Zhang, G. Cao, pDCS: security and privacy support for data-centric sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 1298-1306.
-
M. Shao, S. Zhu, W. Zhang, G. Cao, pDCS: security and privacy support for data-centric sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 1298-1306.
-
-
-
-
26
-
-
51349098378
-
-
B. Sheng, Qun Li, Verifiable privacy-preserving range query in two-tiered sensor networks in: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), 13-18 August 2008, pp. 46-50.
-
B. Sheng, Qun Li, Verifiable privacy-preserving range query in two-tiered sensor networks in: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), 13-18 August 2008, pp. 46-50.
-
-
-
-
29
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
WiSec
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, G. Cao, Towards event source unobservability with minimum network traffic in sensor networks, in: Proceedings of the first ACM Conference on Wireless Network Security (WiSec), 2008, pp.77-88.
-
(2008)
Proceedings of the first ACM Conference on Wireless Network Security
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
30
-
-
49449109253
-
-
Y. Yang, X. Wang, S. Zhu, G. Cao, SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in: ACM Transactions on Information and System Security (TISSEC 2008), 11 (4) (2008).
-
Y. Yang, X. Wang, S. Zhu, G. Cao, SDAP: a secure hop-by-hop data aggregation protocol for sensor networks, in: ACM Transactions on Information and System Security (TISSEC 2008), 11 (4) (2008).
-
-
-
-
31
-
-
51649105341
-
Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach, Elsevier Pervasive and Mobile
-
W. Zhang, Y. Liu, S.K. Das, P. De, Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach, Elsevier Pervasive and Mobile Computing 4 (5) (2008) 658-680.
-
(2008)
Computing
, vol.4
, Issue.5
, pp. 658-680
-
-
Zhang, W.1
Liu, Y.2
Das, S.K.3
De, P.4
-
32
-
-
49149125693
-
-
∧2S: generic privacy-preservation solutions for approximate aggregation of sensor data, concise contribution, in: Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Hong Kong, P.R.C., March 17-21, 2008, pp.179-184.
-
∧2S: generic privacy-preservation solutions for approximate aggregation of sensor data, concise contribution, in: Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Hong Kong, P.R.C., March 17-21, 2008, pp.179-184.
-
-
-
-
33
-
-
35048843897
-
A new scheme on privacy preserving association rule mining
-
N. Zhang, S. Wang, W. Zhao, A new scheme on privacy preserving association rule mining, in: Proceedings of the 8th European conference on Principles and practice of knowledge discovery in databases, 2004, pp. 484-495.
-
(2004)
Proceedings of the 8th European conference on Principles and practice of knowledge discovery in databases
, pp. 484-495
-
-
Zhang, N.1
Wang, S.2
Zhao, W.3
-
34
-
-
32344442645
-
A new scheme on privacy-preserving data classification
-
N. Zhang, S. Wang, W. Zhao, A new scheme on privacy-preserving data classification, in: Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005, pp. 374-383.
-
(2005)
Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 374-383
-
-
Zhang, N.1
Wang, S.2
Zhao, W.3
-
36
-
-
34247555884
-
Privacy-Preserving Data Mining Systems
-
N. Zhang, W. Zhao, Privacy-Preserving Data Mining Systems, IEEE Computer 40 (2007) 52-58.
-
(2007)
IEEE Computer
, vol.40
, pp. 52-58
-
-
Zhang, N.1
Zhao, W.2
-
38
-
-
46649084636
-
Privacy protection against malicious adversaries in distributed information sharing systems
-
N. Zhang, W. Zhao, Privacy protection against malicious adversaries in distributed information sharing systems, IEEE Transactions on Knowledge and Data Engineering, 20 (8) (2008).
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.8
-
-
Zhang, N.1
Zhao, W.2
|