-
2
-
-
33744499939
-
Secure comparison of encrypted data in wireless sensor networks
-
Acharya, M., & Girao, J. (2005). Secure comparison of encrypted data in wireless sensor networks. In 3rd international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (pp. 47-53).
-
(2005)
3rd International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
, pp. 47-53
-
-
Acharya, M.1
Girao, J.2
-
6
-
-
32644435647
-
Energy-efficient secure pattern based data aggregation for wireless sensor networks
-
DOI 10.1016/j.comcom.2004.12.029, PII S0140366405000411
-
H Cam S Ozdemir P Nair D Muthuavinashinappan H Ozgur Sanli 2006 ESPDA: Energy-efficient secure pattern based data aggregation for wireless sensor networks Computer Communication 29 446 455 10.1016/j.comcom.2004.12.029 (Pubitemid 43243228)
-
(2006)
Computer Communications
, vol.29
, Issue.4
, pp. 446-455
-
-
Cam, H.1
Ozdemir, S.2
Nair, P.3
Muthuavinashiappan, D.4
Ozgur Sanli, H.5
-
7
-
-
33744508153
-
A hierarchical energy-efficient framework for data aggregation in wireless sensor networks
-
DOI 10.1109/TVT.2006.873841
-
Y Chen A Liestman J Liu 2006 A hierachical energy-efficient framework for data aggregation in wireless sensor networks IEEE Transactions on Vehicular Technology 55 789 796 10.1109/TVT.2006.873841 10.1109/TVT.2006.873841 (Pubitemid 43811477)
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.3
, pp. 789-796
-
-
Chen, Y.P.1
Liestman, A.L.2
Liu, J.3
-
8
-
-
83255190914
-
Aggregation time control algorithm for time constrained data delivery in wireless sensor networks
-
Choi, J., Lee, J., Lee, K., Choi, S., Kwon, W., & Park, H. (2006). Aggregation time control algorithm for time constrained data delivery in wireless sensor networks. In Proceedings of vehiculare technology (pp. 563-567).
-
(2006)
Proceedings of Vehiculare Technology
, pp. 563-567
-
-
Choi, J.1
Lee, J.2
Lee, K.3
Choi, S.4
Kwon, W.5
Park, H.6
-
9
-
-
2442576849
-
Approximate aggregation techniques for sensor databases
-
Considine, J., Li, F., Kollios, G., & Byers, J. (2004). Approximate aggregation techniques for sensor databases. In Proceedings of IEEE conference on data engineering (p. 449).
-
(2004)
Proceedings of IEEE Conference on Data Engineering
, pp. 449
-
-
Considine, J.1
Li, F.2
Kollios, G.3
Byers, J.4
-
15
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation
-
Westhoff, D., Girao, J., & Acharya, M. (2006).Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation. In Proceedings of IEEE transactions on mobile computing (pp. 1417-1431).
-
(2006)
Proceedings of IEEE Transactions on Mobile Computing
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
16
-
-
77954086150
-
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
-
Wu, K., Dreef, D., Sun, B., & Xiao, Y. (2006). Secure data aggregation without persistent cryptographic operations in wireless sensor networks. In Proceedings of performance, computing, and communications conference (p. 6).
-
(2006)
Proceedings of Performance, Computing, and Communications Conference
, pp. 6
-
-
Wu, K.1
Dreef, D.2
Sun, B.3
Xiao, Y.4
-
17
-
-
0037295692
-
Directed diffusion for wireless sensor networking
-
Intanagonwiwat, C., Govindan, R., Estrin, D., & Heidemann, J. (2003). Directed diffusion for wireless sensor networking. In IEEE/ACM transactions on networking (pp. 2-16).
-
(2003)
IEEE/ACM Transactions on Networking
, pp. 2-16
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
Heidemann, J.4
-
21
-
-
33750404983
-
Secure data aggregation using commitment schemes and quasi commutative functions
-
Raina, M., Ghosh, S., Patro, R., Viswanath, G., & Chadrashekhar, T. (2006). Secure data aggregation using commitment schemes and quasi commutative functions. In Proceedings of 1st international symposium on wireless pervasive computing (pp. 16-18).
-
(2006)
Proceedings of 1st International Symposium on Wireless Pervasive Computing
, pp. 16-18
-
-
Raina, M.1
Ghosh, S.2
Patro, R.3
Viswanath, G.4
Chadrashekhar, T.5
-
22
-
-
33750960640
-
Reliable data aggregation protocol for ad-hoc sensor network environments
-
Shin, S., Lee, J., Baek, J., & Seo, D. (2006). Reliable data aggregation protocol for ad-hoc sensor network environments. In Proceedings of the 8th international conference on advanced technology.
-
(2006)
Proceedings of the 8th International Conference on Advanced Technology
-
-
Shin, S.1
Lee, J.2
Baek, J.3
Seo, D.4
-
23
-
-
27644511275
-
Medians and beyond: New aggregation techniques for sensor networks
-
Shrivastava, N., Buragohain, C., Agrawal, D., & Suri, S. (2004). Medians and beyond: New aggregation techniques for sensor networks. In Proceedings of the 2nd international conferece on embedded networked sensor systems (pp. 239-249).
-
(2004)
Proceedings of the 2nd International Conferece on Embedded Networked Sensor Systems
, pp. 239-249
-
-
Shrivastava, N.1
Buragohain, C.2
Agrawal, D.3
Suri, S.4
-
24
-
-
0041817830
-
A new chaotic secure communication system
-
Li, Z., Li, K., Wen, C., & Soh, Y.(2003). A new chaotic secure communication system. In Proceedings of IEEE transactions on communications (pp. 1306-1312).
-
(2003)
Proceedings of IEEE Transactions on Communications
, pp. 1306-1312
-
-
Li, Z.1
Li, K.2
Wen, C.3
Soh, Y.4
-
25
-
-
34047147417
-
An efficient scheme for encrypted data aggregation on sensor networks
-
Li, T., Wu, Y., & Zhu, H. (2006). An efficient scheme for encrypted data aggregation on sensor networks. In Proceedings of vehicular technology conference (pp. 831-835).
-
(2006)
Proceedings of Vehicular Technology Conference
, pp. 831-835
-
-
Li, T.1
Wu, Y.2
Zhu, H.3
-
26
-
-
84978428047
-
TAG: A tiny aggregation service for ad-hoc sensor networks
-
Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002). TAG: A tiny aggregation service for ad-hoc sensor networks. In Proceedings of 5th symposium on operating systems design and implementation.
-
(2002)
Proceedings of 5th Symposium on Operating Systems Design and Implementation
-
-
Madden, S.1
Franklin, M.J.2
Hellerstein, J.M.3
Hong, W.4
-
27
-
-
77954086232
-
SecureDAV: A secure data aggregation and verfication protocol for sensor networks
-
Mahimkar, A., & Rappaport, T. (2004). SecureDAV: A secure data aggregation and verfication protocol for sensor networks. In Proceedings of global communication.
-
(2004)
Proceedings of Global Communication
-
-
Mahimkar, A.1
Rappaport, T.2
-
29
-
-
47349118294
-
Efficient energy saving in wireless sensor networks through hierarchical-based clustering
-
Moussaoui, O., Ksentini, A., Naimi, M., & Gueroui, M. (2006). Efficient energy saving in wireless sensor networks through hierarchical-based clustering. In Proceedings of the seventh IEEE international symposium on computer networks.
-
(2006)
Proceedings of the Seventh IEEE International Symposium on Computer Networks
-
-
Moussaoui, O.1
Ksentini, A.2
Naimi, M.3
Gueroui, M.4
-
32
-
-
33750839438
-
Cryptoanalysis of a provable secure additive and Multiplicative Privacy Homomorphism
-
Bao, F. (2003). Cryptoanalysis of a provable secure additive and Multiplicative Privacy Homomorphism. In Proceedings of the international workshop on coding and cryptography (pp. 43-50).
-
(2003)
Proceedings of the International Workshop on Coding and Cryptography
, pp. 43-50
-
-
Bao, F.1
-
33
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret sharing
-
Benaloh, J. (1986). Secret sharing homomorphisms: Keeping shares of a secret sharing. In Advances in Cryptology-CRYPTO (pp. 251-260).
-
(1986)
Advances in Cryptology-CRYPTO
, pp. 251-260
-
-
Benaloh, J.1
-
35
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
Domingo-Ferrer, J. (2002). A provably secure additive and multiplicative privacy homomorphism. In Proceedings of information security conference (pp. 471-483).
-
(2002)
Proceedings of Information Security Conference
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
38
-
-
0031619016
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., & Halevi, S. (1998). The random oracle methodology, revisited. In Proceedings of the 30th annual ACM symposium on the theory of computing (pp. 209-218).
-
(1998)
Proceedings of the 30th Annual ACM Symposium on the Theory of Computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
40
-
-
0002360237
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
Rackoff, C., & Simon, D. (1991). Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Proceedings of advances in cryptology.
-
(1991)
Proceedings of Advances in Cryptology
-
-
Rackoff, C.1
Simon, D.2
|