메뉴 건너뛰기




Volumn , Issue , 2010, Pages 472-477

Efficient and robust secure aggregation of encrypted data in sensor networks

Author keywords

Elliptic Curves; Homomorphic Encryption; Secure Data Agregation; Wireless Sensor Networks

Indexed keywords

AGGREGATION METHODS; COMMUNICATION OVERHEADS; CONFIDENTIAL DATA; CRYPTOSYSTEMS; DATA AGGREGATION; DATA RECEPTION; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOGRAPHY; ENCRYPTED DATA; END-TO-END ENCRYPTION; HOMOMORPHIC-ENCRYPTIONS; KEY SIZES; SECURE DATA; SECURITY LEVEL; SENSOR PLATFORM; SUPPORT OPERATIONS; WIRELESS SENSOR;

EID: 77957940949     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SENSORCOMM.2010.76     Document Type: Conference Paper
Times cited : (27)

References (16)
  • 5
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • W. Haodong, S. Bo, and L. Qun. Elliptic curve cryptography-based access control in sensor networks. International Journal of Security and Networks, 1(3-4):127-137, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 127-137
    • Haodong, W.1    Bo, S.2    Qun, L.3
  • 6
    • 51249087814 scopus 로고    scopus 로고
    • Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. Proceedings of IPSN'08, pages 245-256, 2008.
    • (2008) Proceedings of IPSN'08 , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 7
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-dnf formulas on ciphertexts
    • LNCS
    • D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-dnf formulas on ciphertexts. Theory of Cryptography, LNCS, pages 325-341, 2005.
    • (2005) Theory of Cryptography , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 10
    • 84892378963 scopus 로고    scopus 로고
    • Secure encrypted-data aggregation for wireless sensor networks
    • Springer
    • S.-I. Huang, S. Shieh, and J. D. Tygar. Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks journal, Springer, pages 1022-0038, 2009.
    • (2009) Wireless Networks Journal , pp. 0038-1022
    • Huang, S.-I.1    Shieh, S.2    Tygar, J.D.3
  • 11
    • 33645619262 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • J. Domingo-Ferrer. A provably secure additive and multiplicative privacy homomorphism. 6th ISC conference, pages 471-483, 2003.
    • (2003) 6th ISC Conference , pp. 471-483
    • Domingo-Ferrer, J.1
  • 12
    • 29144501477 scopus 로고    scopus 로고
    • Known-plaintext cryptanalysis of the domingo ferrer algebraic privacy homomorphism scheme
    • J. Cheon, W.-H. Kim, and H. Nam. Known-plaintext cryptanalysis of the domingo ferrer algebraic privacy homomorphism scheme. Inf. Processing Letters, 97(3):118-123, 2006.
    • (2006) Inf. Processing Letters , vol.97 , Issue.3 , pp. 118-123
    • Cheon, J.1    Kim, W.-H.2    Nam, H.3
  • 13
    • 70350431948 scopus 로고    scopus 로고
    • Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems
    • Yuhua Luo, editor, volume 5738 of Lecture Notes in Computer Science, Springer
    • H.-Y. Lin and T.-C. Chiang. Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems. In Yuhua Luo, editor, CDVE, volume 5738 of Lecture Notes in Computer Science, pages 384-387. Springer, 2009.
    • (2009) CDVE , pp. 384-387
    • Lin, H.-Y.1    Chiang, T.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.