메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Preserving source-location privacy in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC ALGORITHMS; EVENT MONITORING; INTERMEDIATE NODE; LOW POWER; PUBLIC-KEY CRYPTOSYSTEMS; SIMULATION RESULT; SOURCE-LOCATION PRIVACY; WIRELESS COMMUNICATIONS;

EID: 70449602456     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAHCN.2009.5168962     Document Type: Conference Paper
Times cited : (50)

References (34)
  • 1
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol.24, February 1981.
    • (1981) Communications of the ACM , vol.24
    • Chaum, D.1
  • 2
    • 0023861309 scopus 로고
    • The dinning cryptographer problem: Unconditional sender and recipient untraceability
    • D. Chaum, "The dinning cryptographer problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol.1, no.1, pp. 65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 4
    • 13644250069 scopus 로고    scopus 로고
    • Buses for anonymous message delivery
    • A. Beimel and S. Dolev, "Buses for anonymous message delivery," J. Cryptology, vol.16, pp. 25-39, 2003.
    • (2003) J. Cryptology , vol.16 , pp. 25-39
    • Beimel, A.1    Dolev, S.2
  • 7
    • 35248844472 scopus 로고    scopus 로고
    • Provably secure public-key encryption for length-preserving chaumian mixes
    • LNCS 2612, April
    • B. Möller, "Provably secure public-key encryption for length-preserving chaumian mixes," in Proceedings of CT-RSA 2003, LNCS 2612, pp. 244-262, April 2003.
    • (2003) Proceedings of CT-RSA 2003 , pp. 244-262
    • Möller, B.1
  • 18
    • 33847141964 scopus 로고    scopus 로고
    • Preserving source location privacy in monitoring-based wireless sensor networks
    • IEEE
    • Y. Xi, L. Schwiebert, and W. Shi, "Preserving source location privacy in monitoring-based wireless sensor networks.," in IPDPS, IEEE, 2006.
    • (2006) IPDPS
    • Xi, Y.1    Schwiebert, L.2    Shi, W.3
  • 19
    • 70449569774 scopus 로고    scopus 로고
    • http://www.panda.org/.
  • 20
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • DOI 10.1109/JSAC.2005.863855
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," Selected Areas in Communications, IEEE Journal on, vol.24, pp. 829-835, April 2006. (Pubitemid 46438080)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 31
    • 10944266504 scopus 로고    scopus 로고
    • Heed: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
    • Oct.-Dec.
    • O. Younis and S. Fahmy, "Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," Mobile Computing, IEEE Transactions on, vol.3, pp. 366-379, Oct.-Dec. 2004.
    • (2004) IEEE Transactions on Mobile Computing , vol.3 , pp. 366-379
    • Younis, O.1    Fahmy, S.2
  • 32
    • 45249111845 scopus 로고    scopus 로고
    • Wikipedia. "http://en.wikipedia.org/wiki/Normal-distribution"
    • Wikipedia, "Normal distribution." http://en.wikipedia.org/wiki/ Normal-distribution.
    • Normal Distribution
  • 33
    • 0003864365 scopus 로고    scopus 로고
    • Harvard University Press. Chapter 22 (History of the term "normal distribution".
    • S. M. Stigler, Statistics on the Table. Harvard University Press. Chapter 22 (History of the term "normal distribution".
    • Statistics on the Table
    • Stigler, S.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.