-
1
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan, A. Perrig, Security and Privacy in Sensor Networks, Computer, vol. 36, no. 10 pp.103-105, 2003
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
2
-
-
42749106805
-
Security protocols for use with wireless sensor networks: A survey of security architectures
-
D. Boyle, T. Newe, Security Protocols for Use With Wireless Sensor Networks: A Survey of Security Architectures, In Wireless and Mobile Communications, 2007
-
(2007)
Wireless and Mobile Communications
-
-
Boyle, D.1
Newe, T.2
-
3
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, M. Galloway, A Survey of Key Management Schemes in Wireless Sensor Networks, In Computer Communications, Volume 30, Issue 11-12, pages: 2314-2341, 2007 (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
4
-
-
70350624866
-
Privacy-preserving data publishing: A survey on recent developments
-
B. C. M. Fung, K. Wang, R. Chen, P. S. Yu, Privacy-Preserving Data Publishing: A Survey on Recent Developments, In ACM Computing Surveys, 2009
-
(2009)
ACM Computing Surveys
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
6
-
-
84937564790
-
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
-
Designing Privacy Enhancing Technologies
-
A.Pfitzmann, M. Khntopp. Anonymity, Unobservability, and Pseudonymity- A Proposal for Terminology. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009/2001: 1-9, 2000. (Pubitemid 33241784)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
7
-
-
0023861309
-
Dining cryptographers problem: unconditional sender and recipient untraceability
-
D. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Receipent Untraceability. In Journal of Cryptology, 1(1):65-75, 1988. (Pubitemid 18606152)
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum David1
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. In Communications of the Associations for Computing Machinery,24 (2):84-88, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
10
-
-
0001777423
-
Anonymous web transactions with crowds
-
Feb
-
M. K. Reiter, A.D. Rubin Anonymous Web Transactions with Crowds. In Communications of the ACM, 42(2):32-48, Feb 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
12
-
-
29844444250
-
Incognito: Efficient fulldomain k-anonymity
-
Baltimore
-
K. Lefevre, D. J. Dewitt, R. Ramakrishnan, Incognito: Efficient fulldomain k-anonymity, In Proc. of ACM SIGMOD, Baltimore, 49-60, 2005
-
(2005)
Proc. of ACM SIGMOD
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
13
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
1027
-
P. Samarati, Protecting respondents' identities in microdata release, In IEEE Transactions on Knowledge and Data Engineering 13, 6, 1010,1027, 2005
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010
-
-
Samarati, P.1
-
14
-
-
33746052559
-
Anonymizing tables
-
January
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigraphy, D. Thomas, A. Zhu. Anonymizing tables.In Proc. of the 10th Int'l Conference on Database Theory, January 2005.
-
(2005)
Proc. of the 10th Int'l Conference on Database Theory
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigraphy, R.5
Thomas, D.6
Zhu, A.7
-
16
-
-
33749607006
-
Ldiversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, ldiversity: Privacy beyond k-anonymity. In Proc. 22nd Intnl. Conf. Data Engg. (ICDE), page:24, 2006
-
(2006)
Proc. 22nd Intnl. Conf. Data Engg. (ICDE)
, pp. 24
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
17
-
-
84990966245
-
Privacy Protection: P-Sensitive k-Anonymity Property
-
Conjunction with 22th IEEE International Conference of Data Engineering (ICDE), Atlanta, Georgia
-
T.M. Truta, V. Bindu, Privacy Protection: p-Sensitive k-Anonymity Property. In Proceedings of the Workshop on Privacy Data Management, In Conjunction with 22th IEEE International Conference of Data Engineering (ICDE), Atlanta, Georgia, 2006
-
(2006)
Proceedings of the Workshop on Privacy Data Management
-
-
Truta, T.M.1
Bindu, V.2
-
18
-
-
38049056307
-
Extended p-Sensitive k-Anonymity
-
A. Campan, T.M. Truta, Extended p-Sensitive k-Anonymity, Studia Univ. BABE-BOLYAI, INFORMATICA, Volume LI, Number 2, 2006
-
(2006)
Studia Univ. Babe-Bolyai, Informatica
, vol.51
, Issue.2
-
-
Campan, A.1
Truta, T.M.2
-
20
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
USENIX
-
M. Gruteser, D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, In First International Conference On Mobile Systems, Applications, Services (MobiSYS), USENIX, 2003
-
(2003)
First International Conference on Mobile Systems, Applications, Services (MobiSYS)
-
-
Gruteser, M.1
Grunwald, D.2
-
21
-
-
85092924851
-
Privacy-aware location sensor networks
-
M. Gruteser, G. Schelle, A. Jain, R. Han, D. Grundwald. Privacy-Aware Location Sensor Networks, In Proceedings 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS), 2003.
-
(2003)
Proceedings 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS)
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grundwald, D.5
-
24
-
-
4544307667
-
On providing anonymity in wireless sensor networks
-
A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, K. Jones. On Providing Anonymity in Wireless Sensor Networks, Proceedings of the Tenth International Conference on Parallel and Distributed Systems (ICPADS'04) 1521, 2004
-
(2004)
Proceedings of the Tenth International Conference on Parallel and Distributed Systems (ICPADS'04)
, vol.1521
-
-
Wadaa, A.1
Olariu, S.2
Wilson, L.3
Eltoweissy, M.4
Jones, K.5
-
25
-
-
36549043405
-
Protecting location privacy with personalized k-Anonymity: Architecture and algorithms
-
January
-
B. Gedik, L. Liu, Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms, In IEEE Transactions on Mobile Computing, Volume. 7, No. 1, January 2008
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
-
-
Gedik, B.1
Liu, L.2
|