-
1
-
-
33744499939
-
Secure comparison of encrypted data in wireless sensor networks
-
M. Acharya, J. Girao, D. Westhoff. Secure comparison of encrypted data in wireless sensor networks. WiOpt 2005.
-
(2005)
WiOpt
-
-
Acharya, M.1
Girao, J.2
Westhoff, D.3
-
6
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, E. Mykletun, G. Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. MobiQuitous 2005.
-
(2005)
MobiQuitous
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
7
-
-
33845747795
-
Secure hierarchical innetwork aggregation in sensor networks
-
H. Chan, A. Perrig, D. Song. Secure hierarchical innetwork aggregation in sensor networks. CCS 2006.
-
(2006)
CCS
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
70849089837
-
A witness-based approach for data fusion assurance in WSN
-
W. Du, J. Deng, Y. Han, P. Varshney. A witness-based approach for data fusion assurance in WSN. Globecom, 2003.
-
(2003)
Globecom
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
10
-
-
56749178915
-
Efficient integritypreserving scheme for hierarchical sensor aggregation
-
K. Frikken, J. A. Dougherty IV. Efficient integritypreserving scheme for hierarchical sensor aggregation. WiSec 2008.
-
(2008)
WiSec
-
-
Frikken, K.1
Dougherty IV, J.A.2
-
12
-
-
0024686013
-
Residential energy monitoring and computerized surveillance via utility power flows
-
June
-
G. W. Hart. Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technology and Society June 1989.
-
(1989)
IEEE Technology and Society
-
-
Hart, G.W.1
-
13
-
-
84943753034
-
Secure aggregation for wireless networks
-
L. Hu, D. Evans. Secure aggregation for wireless networks. WSAAN 2003.
-
(2003)
WSAAN
-
-
Hu, L.1
Evans, D.2
-
14
-
-
4544244334
-
SIA: Secure information aggregation in sensor networks
-
B. Przydatek, D. Song, A. Perrig. SIA: Secure information aggregation in sensor networks. ACM Sensys 2003.
-
(2003)
ACM Sensys
-
-
Przydatek, B.1
Song, D.2
Perrig., A.3
-
16
-
-
70849094465
-
Efficient handling of adversary attacks in aggregation applications
-
G. Taban, V. D. Gligor. Efficient handling of adversary attacks in aggregation applications. ESORICS 2008.
-
(2008)
ESORICS
-
-
Taban, G.1
Gligor, V.D.2
-
17
-
-
51849117034
-
Don't sweat your privacy: Using humidity to detect human presence
-
un Han, A. Jain, M. Luk, A. Perrig. Don't sweat your privacy: Using humidity to detect human presence. UbiPriv 2007.
-
(2007)
UbiPriv
-
-
Han, U.1
Jain, A.2
Luk, M.3
Perrig, A.4
-
18
-
-
14844300164
-
Resilient aggregation in sensor networks
-
D. Wagner. Resilient aggregation in sensor networks. ACM SASN 2004.
-
(2004)
ACM SASN
-
-
Wagner, D.1
-
19
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation
-
Oct.
-
D. Westhoff, J. Girao, M. Schneider. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation. IEEE TMC, Oct 2006.
-
(2006)
IEEE TMC
-
-
Westhoff, D.1
Girao, J.2
Schneider, M.3
-
20
-
-
34248672225
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
Y. Yang, X. Wang, S. Zhu, G. Cao. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. ACM MobiHoc 2006.
-
(2006)
ACM MobiHoc
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
21
-
-
70849088196
-
A trust based framework for secure data aggregation in wireless sensor networks
-
W. Zhang, S. Das, Y. Liu. A trust based framework for secure data aggregation in wireless sensor networks. IEEE SECON 2006.
-
(2006)
IEEE SECON
-
-
Zhang, W.1
Das, S.2
Liu., Y.3
|