메뉴 건너뛰기




Volumn 251 CCIS, Issue PART 1, 2011, Pages 400-408

Exploring homomorphic encryption in wireless sensor networks

Author keywords

Data Aggregation; In network Processing; Privacy Homomorphism; Secure Data Aggregation; Wireless Sensor Networks

Indexed keywords

DATA AGGREGATION; IN NETWORK PROCESSING; PRIVACY HOMOMORPHISM; SECURE DATA AGGREGATION; WIRELESS SENSOR;

EID: 83055174719     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-25327-0_34     Document Type: Conference Paper
Times cited : (4)

References (20)
  • 2
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2229-2230 (2008)
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2229-2230
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 3
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53(12), 2022-2037 (2009)
    • (2009) Computer Networks , vol.53 , Issue.12 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 10
    • 34248662954 scopus 로고    scopus 로고
    • In-network aggregation techniques for wireless sensor networks: A survey
    • Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wireless Communications 14(2), 70-87 (2007)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.2 , pp. 70-87
    • Fasolo, E.1    Rossi, M.2    Widmer, J.3    Zorzi, M.4
  • 13
    • 84945300542 scopus 로고    scopus 로고
    • A Provably Secure Additive and Multiplicative Privacy Homomorphism
    • Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Information Security Conference, pp. 471-483 (2002)
    • (2002) Information Security Conference , pp. 471-483
    • Domingo-Ferrer, J.1
  • 14
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97-105 (2010)
    • (2010) Commun. ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 15
    • 84957893114 scopus 로고    scopus 로고
    • On Software Protection via Function Hiding
    • Aucsmith, D. (ed.) IH 1998. Springer, Heidelberg
    • Sander, T., Tschudin, C.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 111-123. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1525 , pp. 111-123
    • Sander, T.1    Tschudin, C.2
  • 16
    • 0003197918 scopus 로고    scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • Mobile Agents and Security
    • Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44-60. Springer, Heidelberg (1998) (Pubitemid 128104562)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.