-
1
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan, H.; Perrig, A. Security and privacy in sensor networks. Computer 2003, 36, 103-105.
-
(2003)
Computer
, vol.36
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
2
-
-
42749106805
-
Security protocols for use with wireless sensor networks: A survey of security architectures
-
Guadeloupe, France, 4-9 March
-
Boyle, D.; Newe, T. Security protocols for use with wireless sensor networks: A survey of security architectures, In Proceedings of the Third International Conference on Wireless and Mobile Communications (ICWMC 2007), Guadeloupe, France, 4-9 March 2007.
-
(2007)
Proceedings of the Third International Conference On Wireless and Mobile Communications (ICWMC 2007)
-
-
Boyle, D.1
Newe, T.2
-
3
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Xiao, Y.; Rayi, V.K.; Sun, B.; Du, X.; Hu, F.; Galloway, M.; A survey of key management schemes in wireless sensor networks, Comput. Commun. 2007, 30, 2314-2341.
-
(2007)
Comput. Commun
, vol.30
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
4
-
-
77951201056
-
Privacy-preserving data publishing: A Survey on recent developments
-
Fung, B.C.M.; Wang, K.; Chen, R.; Yu, P.S. Privacy-preserving data publishing: A Survey on recent developments. ACM Comput. Surv. 2009, 42, 1-53.
-
(2009)
ACM Comput. Surv
, vol.42
, pp. 1-53
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
6
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity-A proposal for terminology
-
Springer: Berlin, Germany
-
Pfitzmann, A.; Khntopp, M.; Anonymity, unobservability, and pseudonymity-A proposal for terminology. In Designing Privacy Enhancing Technologies; Springer: Berlin, Germany, 2001; Volume 2009/2001, pp. 1-9.
-
(2001)
Designing Privacy Enhancing Technologies
, vol.2009
, Issue.2001
, pp. 1-9
-
-
Pfitzmann, A.1
Khntopp, M.2
-
7
-
-
80052799499
-
A general survey of privacy preserving data mining models and algorithms
-
Aggarwal, C.C.; Yu, P.S. A general survey of privacy preserving data mining models and algorithms. Priv. Preserving Data Min. Models Algorithm. 2008, 34, 11-52.
-
(2008)
Priv. Preserving Data Min. Models Algorithm
, vol.34
, pp. 11-52
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
8
-
-
78650779631
-
An overview of rrivacy preserving data mining
-
doi: 10.1145/1558897.1558903
-
Gkoulalas-Divanis, A.; Verykiosc, V.S. An overview of rrivacy preserving data mining. Crossroads 2009, 15, doi: 10.1145/1558897.1558903.
-
(2009)
Crossroads
, vol.15
-
-
Gkoulalas-Divanis, A.1
Verykiosc, V.S.2
-
9
-
-
77949498395
-
K-Anonymity based framework for privacy preserving data collection in wireless sensor networks
-
Bahsi, H.; Levi, A. k-Anonymity based framework for privacy preserving data collection in wireless sensor networks. Turk. J. Electr. Eng. Comput. Sci. 2010, 18, 241-271.
-
(2010)
Turk. J. Electr. Eng. Comput. Sci
, vol.18
, pp. 241-271
-
-
Bahsi, H.1
Levi, A.2
-
10
-
-
0347412078
-
Software clustering based on information loss minimization
-
Victoria, Canada,13-16 November 2003; IEEE Computer Society: Washington, DC, USA
-
Andritsos, P.; Tzerpos, V. Software clustering based on information loss minimization. In Proceedings of the 10th Working Conference on Reverse Engineering(WCRE'03), Victoria, Canada, 13-16 November 2003; IEEE Computer Society: Washington, DC, USA, 2003; p. 334.
-
(2003)
In Proceedings of the 10th Working Conference On Reverse Engineering(WCRE'03)
, pp. 334
-
-
Andritsos, P.1
Tzerpos, V.2
-
11
-
-
34548850872
-
A survey on clustering algorithms for wireless sensor networks
-
Abbasi, A.A.; Younis, M. A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 2007, 30, 2826-2841.
-
(2007)
Comput. Commun
, vol.30
, pp. 2826-2841
-
-
Abbasi, A.A.1
Younis, M.2
-
12
-
-
0010461175
-
Constraints and Approaches for Distributed Sensor Network Security; Technical Report 00-010; NAI Labs
-
Carman, D.W.; Kruus, P.S.; Matt, B.J. Constraints and Approaches for Distributed Sensor Network Security; Technical Report 00-010; NAI Labs, The Security Research Division Network Associates, Inc.: Los Angeles, CA, USA, 2000.
-
(2000)
The Security Research Division Network Associates, Inc.: Los Angeles, CA, USA
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
14
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
Baltimore, MD, USA, 14-16 June 2005; ACM: New York, NY, USA
-
Lefevre, K.; Dewitt, D.J.; Ramakrishnan, R. Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data, Baltimore, MD, USA, 14-16 June 2005; ACM: New York, NY, USA, 2005; pp. 49-60.
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference On Management of Data
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
15
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P. Protecting respondents' identities in microdata release. IEEE Trans. Know. Data Eng. 2005, 13, 1010-1027.
-
(2005)
IEEE Trans. Know. Data Eng
, vol.13
, pp. 1010-1027
-
-
Samarati, P.1
-
16
-
-
77049087087
-
Anonymizing tables
-
Springer: Berlin, Germany
-
Aggarwal, G.; Feder, T.; Kenthapadi, K.; Motwani, R.; Panigraphy, R.; Thomas, D.; Zhu, A. Anonymizing tables. In Database Theory - ICDT 2005; Springer: Berlin, Germany; Volume 3363/2005, pp. 246-258.
-
Database Theory - ICDT 2005
, vol.3363
, Issue.2005
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigraphy, R.5
Thomas, D.6
Zhu, A.7
-
17
-
-
0242698173
-
Datafly: A System for providing anonymity in medical data
-
Lake Tahoe, CA, USA 10-13 August 1997; Chapman & Hall, Ltd.: London, UK
-
Sweeney, L. Datafly: A System for providing anonymity in medical data. In Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, Lake Tahoe, CA, USA 10-13 August 1997; Chapman & Hall, Ltd.: London, UK, 1997; pp. 356-381.
-
(1997)
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference On Database Securty XI: Status and Prospects
, pp. 356-381
-
-
Sweeney, L.1
-
18
-
-
33749607006
-
L-Diversity: Privacy beyond k-anonymity
-
Atlanta, GA, USA
-
Machanavajjhala, A.; Gehrke, J.; Kifer, D.; Venkitasubramaniam, M. l-Diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd International Conference Data Engineering (ICDE), Atlanta, GA, USA, 3-7 April 2006.
-
(2006)
Proceedings of the 22nd International Conference Data Engineering (ICDE)
, pp. 3-7
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
19
-
-
84990966245
-
Privacy protection: P-Sensitive k-anonymity property
-
Atlanta, GA, USA
-
Truta, T.M.; Bindu, V. Privacy protection: p-Sensitive k-anonymity property. In Proceedings of the 22th IEEE International Conference of Data Engineering (ICDE), Atlanta, GA, USA, 3-7 April 2006.
-
(2006)
Proceedings of the 22th IEEE International Conference of Data Engineering (ICDE)
, pp. 3-7
-
-
Truta, T.M.1
Bindu, V.2
-
21
-
-
34548805858
-
Venkatasubramanian, S. t-Closeness: Privacy beyond k-anonymity and l-diversity
-
Istanbul, Turkey, April, Available on line, doi=10.1.1.92.587 (accessed on 30 July 2010)
-
Li, N.; Li, T.; Venkatasubramanian, S. t-Closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of IEEE 23rd International Conference on Data Engineering (ICDE07), Istanbul, Turkey, April 2007; Available on line: http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.92.587 (accessed on 30 July 2010).
-
Proceedings of IEEE 23rd International Conference On Data Engineering (ICDE07)
-
-
Li, N.1
Li, T.2
-
22
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and receipent untraceability
-
Chaum, D. The dining cryptographers problem: Unconditional sender and receipent untraceability. J. Cryptol. 1988, 1, 65-75.
-
(1988)
J. Cryptol
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
23
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. Associations Comput. Mach. 1981, 24, 84-88.
-
(1981)
Commun. Associations Comput. Mach
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
24
-
-
85031542311
-
Mixing email with BABEL
-
San Diego, CA, USA
-
Gulcu, C.; Tsudik, G. Mixing email with BABEL. In Proceedings of 1996 Symposium on Network and Distributed System Security (SNDSS '96), San Diego, CA, USA, 22-23 February 1996.
-
(1996)
Proceedings of 1996 Symposium On Network and Distributed System Security (SNDSS '96)
, pp. 22-23
-
-
Gulcu, C.1
Tsudik, G.2
-
25
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter, M.K. Rubin, A.D. Anonymous web transactions with crowds. Commun. ACM 1999, 42, 32-48.
-
(1999)
Commun. ACM
, vol.42
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
26
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
San Franscisco, CA, USA, 5-8 May 2003; ACM: New York,NY, USA
-
Gruteser, M.; Grunwald, D. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st International Conference On Mobile Systems, Applications, Services (MobiSYS), San Franscisco, CA, USA, 5-8 May 2003; ACM: New York, NY, USA, 2003; pp. 31-42.
-
(2003)
In Proceedings of the 1st International Conference On Mobile Systems, Applications, Services (MobiSYS
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
27
-
-
85092924851
-
Privacy-aware location sensor networks
-
Lihue, HI,USA
-
Gruteser, M.; Schelle, G.; Jain, A.; Han, R.; Grundwald, D. Privacy-aware location sensor networks. In Proceedings the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS), Lihue, HI, USA, 18-21 May 2003.
-
(2003)
Proceedings the 9th USENIX Workshop On Hot Topics In Operating Systems (HotOS)
, pp. 18-21
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grundwald, D.5
-
28
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
Washington DC, USA, 25 October 2004; ACM: New York, NY, USA
-
Ozturk, C.; Zhang, Y.; Trappe, W. Source-location privacy in energy-constrained sensor network routing, In Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, 25 October 2004; ACM: New York, NY, USA, 2004; pp. 88-93.
-
(2004)
In Proceedings of the 2004 ACM Workshop On Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
29
-
-
34548310311
-
Protecting Receiver-location Privacy In Wireless Sensor Networks
-
Anchorage, AK, USA
-
Jian, Y.; Chen, S.; Zhang, Z.; Zhang, L. Protecting receiver-location privacy in wireless sensor networks. In Proceedings of the 26th Annual IEEE Conference on Computer Communications (IEEE INFOCOM 2007), Anchorage, AK, USA, 6-12 May 2007.
-
(2007)
Proceedings of the 26th Annual IEEE Conference On Computer Communications (IEEE INFOCOM 2007)
, pp. 6-12
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
30
-
-
4544307667
-
On providing anonymity in wireless sensor networks
-
Newport Beach, CA, USA, 7-9 July 2004; IEEE Computer Society:, Washington, DC, USA
-
Wadaa, A.; Olariu, S.; Wilson, L.; Eltoweissy, M.; Jones, K. On providing anonymity in wireless sensor networks. In Proceedings of the Tenth International Conference on Parallel and Distributed Systems (ICPADS'04), Newport Beach, CA, USA, 7-9 July 2004; IEEE Computer Society: Washington, DC, USA, 2004.
-
(2004)
Proceedings of the Tenth International Conference On Parallel and Distributed Systems (ICPADS'04)
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Eltoweissy, M.4
Jones, K.5
-
31
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
Gedik, B.; Liu, L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput. 2008, 7, 1-18.
-
(2008)
IEEE Trans. Mob. Comput
, vol.7
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
|