-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102-114 (2002)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
46449122114
-
Wireless sensor network survey
-
Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Computer Networks 52(12), 2229-2230 (2008)
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2229-2230
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
3
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks 53(12), 2022-2037 (2009)
-
(2009)
Computer Networks
, vol.53
, Issue.12
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
5
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
November
-
Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: Proc. Second ACM Conference on Embedded Networked Sensor Systems, pp. 162-175 (November 2004)
-
(2004)
Proc. Second ACM Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
6
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proc. Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109-117 (2005)
-
(2005)
Proc. Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
7
-
-
36348942851
-
On concealed data aggregation for wireless sensor networks
-
Peter, S., Piotrowski, K., Langendoerfer, P.: On concealed data aggregation for wireless sensor networks. In: Proc. Fourth IEEE Consumer Communications and Networking Conference, pp. 192-196 (2007)
-
(2007)
Proc. Fourth IEEE Consumer Communications and Networking Conference
, pp. 192-196
-
-
Peter, S.1
Piotrowski, K.2
Langendoerfer, P.3
-
9
-
-
33645761895
-
A method of Homomorphic encryption
-
Guangli, X., Xinmeng, C., Ping, Z., Jie, M.: A method of Homomorphic encryption. Wuhan University Journal of Natural Sciences 11(1), 181-184 (2006)
-
(2006)
Wuhan University Journal of Natural Sciences
, vol.11
, Issue.1
, pp. 181-184
-
-
Guangli, X.1
Xinmeng, C.2
Ping, Z.3
Jie, M.4
-
10
-
-
34248662954
-
In-network aggregation techniques for wireless sensor networks: A survey
-
Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wireless Communications 14(2), 70-87 (2007)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.2
, pp. 70-87
-
-
Fasolo, E.1
Rossi, M.2
Widmer, J.3
Zorzi, M.4
-
11
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Academic Press
-
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169-177. Academic Press (1978)
-
(1978)
Foundations of Secure Computation
, pp. 169-177
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
12
-
-
84871210733
-
Secure data aggregation in wireless sensor network: A survey
-
Alzaid, H., Foo, E., Nieto, J.G.: Secure data aggregation in wireless sensor network: a survey. In: Proc. of the Sixth Australasian Conference on Information Security (AISC 2008), vol. 81, pp. 93-105 (2008)
-
(2008)
Proc. of the Sixth Australasian Conference on Information Security (AISC 2008)
, vol.81
, pp. 93-105
-
-
Alzaid, H.1
Foo, E.2
Nieto, J.G.3
-
13
-
-
84945300542
-
A Provably Secure Additive and Multiplicative Privacy Homomorphism
-
Domingo-Ferrer, J.: A Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Information Security Conference, pp. 471-483 (2002)
-
(2002)
Information Security Conference
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
14
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97-105 (2010)
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
15
-
-
84957893114
-
On Software Protection via Function Hiding
-
Aucsmith, D. (ed.) IH 1998. Springer, Heidelberg
-
Sander, T., Tschudin, C.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 111-123. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1525
, pp. 111-123
-
-
Sander, T.1
Tschudin, C.2
-
16
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
Mobile Agents and Security
-
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44-60. Springer, Heidelberg (1998) (Pubitemid 128104562)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
18
-
-
17544377081
-
System Architecture Directions for Networked Sensors
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System Architecture Directions for Networked Sensors. SIGPLAN Not. 35(11), 93-104 (2000)
-
(2000)
SIGPLAN Not.
, vol.35
, Issue.11
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
|