-
1
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), pp. 51-55 (2008)
-
(2008)
Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008)
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
2
-
-
67650461985
-
Privacy preservation in wireless sensor networks: A state-of-the-art survey
-
Li, N., Zhang, N., Das, S., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks 7, 1501-1514 (2009)
-
(2009)
Ad Hoc Networks
, vol.7
, pp. 1501-1514
-
-
Li, N.1
Zhang, N.2
Das, S.3
Thuraisingham, B.4
-
3
-
-
34548301953
-
Pda: Privacy-preserving data aggregation in wireless sensor networks
-
He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: Pda: Privacy-preserving data aggregation in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 2045-2053 (2007)
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007)
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
4
-
-
67749093267
-
Privacy-preserving robust data aggregation in wireless sensor networks
-
Conti, M., Zhang, L., Roy, S., Di Pietro, R., Jajodia, S., Mancini, L.V.: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2, 195-213 (2009)
-
(2009)
Security and Communication Networks
, vol.2
, pp. 195-213
-
-
Conti, M.1
Zhang, L.2
Roy, S.3
Di Pietro, R.4
Jajodia, S.5
Mancini, L.V.6
-
5
-
-
33847141964
-
Preserving source location privacy in monitoring-based wireless sensor networks
-
Xi, Y., Schwiebert, L., Shi, W.: Preserving source location privacy in monitoring-based wireless sensor networks. In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), pp. 77-88 (2006)
-
(2006)
20th International Parallel and Distributed Processing Symposium (IPDPS 2006)
, pp. 77-88
-
-
Xi, Y.1
Schwiebert, L.2
Shi, W.3
-
6
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599-608 (2005)
-
(2005)
Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
7
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
Ozturk, C., Zhang, Y., Trappe, W.: Source-location privacy in energy-constrained sensor network routing. In: Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 88-93 (2004)
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
Trappe, W.3
-
8
-
-
33746102951
-
Using data aggregation to prevent traffic analysis in wireless sensor networks
-
Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. Springer, Heidelberg
-
Conner, W., Abdelzaher, T., Nahrstedt, K.: Using data aggregation to prevent traffic analysis in wireless sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol. 4026, p. 202. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4026
, pp. 202
-
-
Conner, W.1
Abdelzaher, T.2
Nahrstedt, K.3
-
9
-
-
34548310311
-
Protecting receiver-location privacy in wireless sensor networks
-
Jian, Y., Chen, S., Zhang, Z., Zhang, L.: Protecting receiver-location privacy in wireless sensor networks. In: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007), pp. 1955-1963 (2007)
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM 2007)
, pp. 1955-1963
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
10
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007), pp. 314-323 (2007)
-
(2007)
Proceedings of the IEEE International Conference on Network Protocols (ICNP 2007)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
11
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec 2008), pp. 77-88 (2008)
-
(2008)
Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec 2008)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
12
-
-
70249120775
-
Source location privacy against laptop-class attacks in sensor networks
-
Ouyang, Y., Le, Z., Liu, D., Ford, J., Makedon, F.: Source location privacy against laptop-class attacks in sensor networks. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), pp. 1-10 (2008)
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008)
, pp. 1-10
-
-
Ouyang, Y.1
Le, Z.2
Liu, D.3
Ford, J.4
Makedon, F.5
-
13
-
-
84885889028
-
An active global attack model for sensor source location privacy: Analysis and countermeasures
-
Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Springer, Heidelberg
-
Yang, Y., Zhu, S., Cao, G., LaPorta, T.: An active global attack model for sensor source location privacy: Analysis and countermeasures. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 19, pp. 373-393. Springer, Heidelberg (2009)
-
(2009)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.19
, pp. 373-393
-
-
Yang, Y.1
Zhu, S.2
Cao, G.3
LaPorta, T.4
-
14
-
-
52249090009
-
Providing anonymity in wireless sensor networks
-
Ouyang, Y., Le, Z., Xu, Y., Triandopoulos, N., Zhang, S., Ford, J., Makedon, F.: Providing anonymity in wireless sensor networks. In: IEEE International Conference on Pervasive Services, pp. 145-148 (2007)
-
(2007)
IEEE International Conference on Pervasive Services
, pp. 145-148
-
-
Ouyang, Y.1
Le2
Xu, Y.3
Triandopoulos, N.4
Zhang, S.5
Ford, J.6
Makedon, F.7
-
15
-
-
3242815149
-
Towards measuring anonymity
-
Dingledine, R. (ed.) PET 2003. Springer, Heidelberg
-
Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 184-188. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2760
, pp. 184-188
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
17
-
-
14844282596
-
K-anonymous message transmission
-
von Ahn, L., Bortz, A., Hopper, N.J.: k-anonymous message transmission. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 122-130 (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)
, pp. 122-130
-
-
Von Ahn, L.1
Bortz, A.2
Hopper, N.J.3
-
18
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 5, 128-143 (2006)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, pp. 128-143
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
|