메뉴 건너뛰기




Volumn 6555 LNCS, Issue , 2011, Pages 20-28

Event handoff unobservability in WSN

Author keywords

[No Author keywords available]

Indexed keywords

CONTEXT PRIVACY; RESEARCH COMMUNITIES; UNOBSERVABILITY; WIRELESS SENSOR NETWORK (WSNS);

EID: 79952255507     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19228-9_3     Document Type: Conference Paper
Times cited : (3)

References (18)
  • 2
    • 67650461985 scopus 로고    scopus 로고
    • Privacy preservation in wireless sensor networks: A state-of-the-art survey
    • Li, N., Zhang, N., Das, S., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 1501-1514 (2009)
    • (2009) Ad Hoc Networks , vol.7 , pp. 1501-1514
    • Li, N.1    Zhang, N.2    Das, S.3    Thuraisingham, B.4
  • 8
    • 33746102951 scopus 로고    scopus 로고
    • Using data aggregation to prevent traffic analysis in wireless sensor networks
    • Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. Springer, Heidelberg
    • Conner, W., Abdelzaher, T., Nahrstedt, K.: Using data aggregation to prevent traffic analysis in wireless sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, p. 202. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4026 , pp. 202
    • Conner, W.1    Abdelzaher, T.2    Nahrstedt, K.3
  • 13
    • 84885889028 scopus 로고    scopus 로고
    • An active global attack model for sensor source location privacy: Analysis and countermeasures
    • Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Springer, Heidelberg
    • Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An active global attack model for sensor source location privacy: Analysis and countermeasures. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 19, pp. 373-393. Springer, Heidelberg (2009)
    • (2009) Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , vol.19 , pp. 373-393
    • Yang, Y.1    Zhu, S.2    Cao, G.3    LaPorta, T.4
  • 15
    • 3242815149 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Dingledine, R. (ed.) PET 2003. Springer, Heidelberg
    • Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 184-188. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2760 , pp. 184-188
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 18
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 5, 128-143 (2006)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , pp. 128-143
    • Potlapally, N.1    Ravi, S.2    Raghunathan, A.3    Jha, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.