메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Verifiable fine-grained top-k queries in tiered sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION-LEVEL ATTACKS; CRYPTOGRAPHIC PRIMITIVES; DATA QUERY; DOS ATTACKS; HIGH EFFICACY; HOSTILE ENVIRONMENTS; INCOMPLETE DATA; LARGE SCALE SENSOR NETWORK; MILITARY ACTIONS; NETWORK COMMUNICATIONS; QUANTITATIVE RESULT; QUERY RESULTS; RESOURCE-RICH; TOP-K QUERY; TWO-TIER ARCHITECTURE;

EID: 77953304573     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5461927     Document Type: Conference Paper
Times cited : (69)

References (14)
  • 1
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
    • ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005 , pp. 378-389
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 3
    • 51349098378 scopus 로고    scopus 로고
    • Verifiable privacy-preserving range query in sensor networks
    • B. Sheng and Q. Li, "Verifiable privacy-preserving range query in sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008, pp. 46-50.
    • IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008 , pp. 46-50
    • Sheng, B.1    Li, Q.2
  • 10
    • 49449086367 scopus 로고    scopus 로고
    • Attack-resistant location estimation in wireless sensor networks
    • July
    • D. Liu, P. Ning, A. Liu, C. Wang, and W. Du, "Attack-resistant location estimation in wireless sensor networks," ACM TISSEC, vol. 11, no. 4, pp. 1-39, July 2008.
    • (2008) ACM TISSEC , vol.11 , Issue.4 , pp. 1-39
    • Liu, D.1    Ning, P.2    Liu, A.3    Wang, C.4    Du, W.5
  • 11
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel μTESLA: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multilevel μTESLA: Broadcast authentication for distributed sensor networks," Trans. on Embedded Computing Sys., vol. 3, no. 4, pp. 800-836, 2004.
    • (2004) Trans. on Embedded Computing Sys. , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 12
    • 26444532494 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • Aug.
    • P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, Aug. 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 , pp. 365-403
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 14
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN'08, St. Louis, MO, Apr. 2008, pp. 245-256.
    • IPSN'08, St. Louis, MO, Apr. 2008 , pp. 245-256
    • Liu, A.1    Ning, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.