-
1
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
Anchorage, USA, pp
-
Y. Jian, S. Chen, Z. Zhang et al., "Protecting receiver-location privacy in wireless sensor networks", In Proc. of IEEE INFOCOM, Anchorage, USA, pp. 1955-1963, 2007.
-
(2007)
Proc. of IEEE INFOCOM
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
-
2
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
Beijing, China, pp
-
K. Mehta, D. Liu, M. Wright, "Location privacy in sensor networks against a global eavesdropper", In Proc. of the 15th IEEE International Conference on Network Protocol (ICNP), Beijing, China, pp. 314-323, 2007.
-
(2007)
Proc. of the 15th IEEE International Conference on Network Protocol (ICNP)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
3
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
Columbus, USA, pp
-
P. Kamat, Y. Zhang, W. Trappe et al., "Enhancing sourcelocation privacy in sensor network routing", In Proc. of the 25th International Conference on Distributed Computing Systems (ICDCS), Columbus, USA, pp. 599-608, 2005.
-
(2005)
Proc. of the 25th International Conference on Distributed Computing Systems (ICDCS)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
-
4
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
Washington, USA, pp
-
C. Ozturk, Y. Zhang, W. Trappe, "Source-location privacy in energy-constrained sensor network routing", In Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Washington, USA, pp. 88-93, 2004.
-
(2004)
Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
5
-
-
0034291601
-
GPS-less low cost outdoor localization for very small devices
-
N. Bulusu, J. Heidemann, D. Estrin, "GPS-less low cost outdoor localization for very small devices", IEEE Personal Communications Magazine, Vol. 7, No. 5, pp. 28-34, 2000.
-
(2000)
IEEE Personal Communications Magazine
, vol.7
, Issue.5
, pp. 28-34
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
6
-
-
35248891504
-
Organizing a global coordinate system from local information on an ad hoc sensor network
-
Palo Alto, USA, pp
-
R. Nagpal, H. Shrobe, J. Bachrach, "Organizing a global coordinate system from local information on an ad hoc sensor network", In Proc. of the 2nd International Workshop on Information Processing in Sensor Networks (IPSN), Palo Alto, USA, pp. 333-348, 2003.
-
(2003)
Proc. of the 2nd International Workshop on Information Processing in Sensor Networks (IPSN)
, pp. 333-348
-
-
Nagpal, R.1
Shrobe, H.2
Bachrach, J.3
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and public key cryptosystems", Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
9
-
-
0022882770
-
How to generate and exchange secrets
-
Toronto, Canada, pp
-
A. C. Yao, "How to generate and exchange secrets", In Proc. of the 27th IEEE Symposium on Foundations of Computer Science (FOCS), Toronto, Canada, pp. 162-167, 1986.
-
(1986)
Proc. of the 27th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 162-167
-
-
Yao, A.C.1
-
10
-
-
34247481441
-
Multivariate oblivious polynomial evaluation protocol
-
M. Xiao, L. Huang, A. Liu et al., "Multivariate oblivious polynomial evaluation protocol", Chinese Journal of Electronics, Vol. 16, No. 2, pp. 217-222, 2007.
-
(2007)
Chinese Journal of Electronics
, vol.16
, Issue.2
, pp. 217-222
-
-
Xiao, M.1
Huang, L.2
Liu, A.3
-
11
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
Vancouver, Canada, pp
-
I. Ioannidis, A. Grama, M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments", In Proc. of the 31st International Conference on Parallel Processing (ICPP), Vancouver, Canada, pp. 379-384, 2002.
-
(2002)
Proc. of the 31st International Conference on Parallel Processing (ICPP)
, pp. 379-384
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
12
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, X. Lin et al., "Tools for privacy preserving distributed data mining", ACM SIGKDD Explorations Newsletter, Vol. 4, No. 2, pp. 28-34, 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Lin, X.3
-
13
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Canada, pp
-
J. Vaidya, C. Clifton, "Privacy preserving association rule mining in vertically partitioned data", In Proc. of ACM SIGKDD, Edmonton, Canada, pp. 639-644, 2002.
-
(2002)
Proc. of ACM SIGKDD
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
|