메뉴 건너뛰기




Volumn 10, Issue 6, 2010, Pages 843-856

MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks

Author keywords

Energy efficiency; Multidimensional; Privacy preserving data aggregation; Wireless sensor network

Indexed keywords

AGGREGATION SCHEMES; DATA AGGREGATION; ENERGY COST; PRIVACY PRESERVATION; PRIVACY PRESERVING; PRIVACY-PRESERVING DATA AGGREGATION; SAVING ENERGY;

EID: 77952053188     PISSN: 15308669     EISSN: 15308677     Source Type: Journal    
DOI: 10.1002/wcm.796     Document Type: Article
Times cited : (62)

References (26)
  • 9
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptations
    • Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptations. IEEE Transactions on Mobile Computing 2006; 5(10): 1417-1431.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 13
    • 77952044694 scopus 로고    scopus 로고
    • Enviromon.net, a division of Netmon Inc
    • Enviromon.net, a division of Netmon Inc. http://www.enviromon.net/.
  • 14
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • DOI 10.1016/j.adhoc.2006.05.012, PII S1570870506000412, Security Issues in Sensor and Ad Hoc Networks
    • Du X, Xiao Y, Guizani M, Chen H. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks 2007; 5(1): 24-34. (Pubitemid 44573000)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.-H.4
  • 15
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Santa Barbara, California, USA, LNCS 2139. Springer-Verlag: New York
    • Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Proceedings of Advances in Cryptology (Crypto 2001), Santa Barbara, California, USA, LNCS 2139. Springer-Verlag: New York, 2001; 213-229.
    • (2001) Proceedings of Advances in Cryptology (Crypto 2001) , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 17
    • 33746898272 scopus 로고    scopus 로고
    • The k-neighbors approach to interference bounded and symmetric topology control in ad hoc networks
    • Blough D, Leoncini M, Resta G, Santi P. The k-neighbors approach to interference bounded and symmetric topology control in ad hoc networks. IEEE Transactions on Mobile Computing 2006; 5(9): 1267-1282.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.9 , pp. 1267-1282
    • Blough, D.1    Leoncini, M.2    Resta, G.3    Santi, P.4
  • 24
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Santa Barbara, California, USA, LNCS 2442. Springer-Verlag: New York
    • Barreto P, Kim H, Bynn B, Scott M. Efficient algorithms for pairing-based cryptosystems. Proceedings of Advances in Cryptology (Crypto 2002), Santa Barbara, California, USA, LNCS 2442. Springer-Verlag: New York, 2002; 354-368.
    • (2002) Proceedings of Advances in Cryptology (Crypto 2002) , pp. 354-368
    • Barreto, P.1    Kim, H.2    Bynn, B.3    Scott, M.4
  • 25
    • 77952027114 scopus 로고    scopus 로고
    • Intel PXA255 Processor Electrical, Mechanical, and Thermal Specification. Available online at:
    • Intel PXA255 Processor Electrical, Mechanical, and Thermal Specification. Available online at: http://www.intel. com/design/pca/applicationsprocessors/ manuals/278780.htm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.