-
1
-
-
77953308558
-
Prisense: Privacy-preserving data aggregation in people-centric urban sensing systems
-
San Diego, CA
-
Shi J, Zhang R, Liu Y, Zhang Y,. Prisense: privacy-preserving data aggregation in people-centric urban sensing systems, Proceedings of the IEEE INFOCOM 2010, San Diego, CA, 2010.
-
(2010)
Proceedings of the IEEE INFOCOM 2010
-
-
Shi, J.1
Zhang, R.2
Liu, Y.3
Zhang, Y.4
-
2
-
-
67650844989
-
Sensor network security: A survey
-
Chen X, Makki K, Yen K, Pissinou N,. Sensor network security: a survey. IEEE Communications Surveys and Tutorials 2009 11 (2): 52-73.
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
4
-
-
78149396320
-
A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding
-
Chen J, Fang BX, Yin LH, SU S,. A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding. Chinese Journal of Computers 2010 33 (9): 1736-1747.
-
(2010)
Chinese Journal of Computers
, vol.33
, Issue.9
, pp. 1736-1747
-
-
Chen, J.1
Fang, B.X.2
Yin, L.H.3
Su, S.4
-
6
-
-
85032751636
-
Locating the nodes: Cooperative localization in wireless sensor networks
-
DOI 10.1109/MSP.2005.1458287
-
Patwari N, Ash JN, Kyperountas S, Hero AO, Moses RL, Correal NS,. Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Processing Magazine 2005 22 (4): 54-69. (Pubitemid 41009634)
-
(2005)
IEEE Signal Processing Magazine
, vol.22
, Issue.4
, pp. 54-69
-
-
Patwari, N.1
Ash, J.N.2
Kyperountas, S.3
Hero III, A.O.4
Moses, R.L.5
Correal, N.S.6
-
7
-
-
70350234578
-
A survey of anonymity in wireless communication systems
-
Chen H, Xiao Y, Hong X, Hu F, Xie J,. A survey of anonymity in wireless communication systems. Security and Communication Networks 2009 2 (5): 427-444.
-
(2009)
Security and Communication Networks
, vol.2
, Issue.5
, pp. 427-444
-
-
Chen, H.1
Xiao, Y.2
Hong, X.3
Hu, F.4
Xie, J.5
-
10
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
Tsai K, Hsu C, Wu T,. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010 5 (1): 45-52.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
13
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
Yang Y, Shao M, Zhu S, Urgaonkar B, Cao G,. Towards event source unobservability with minimum network traffic in sensor networks, Proceedings of the first ACM Conference on Wireless Network Security, 2008.
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
19
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
DOI 10.1145/1138127.1138130
-
Law YW, Doumen J, Hartel P,. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 2006 2 (1): 65-93. (Pubitemid 43925113)
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
20
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
Misra S, Xue G,. Efficient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks 2006 1 (1): 50-63.
-
(2006)
International Journal of Sensor Networks
, vol.1
, Issue.1
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
21
-
-
55649095270
-
Location privacy and anonymity preserving routing for wireless sensor networks
-
Nezhad AA, Miri A, Makrakis D,. Location privacy and anonymity preserving routing for wireless sensor networks. Journal of Computer Networks 2008 52 (18): 3433-3452.
-
(2008)
Journal of Computer Networks
, vol.52
, Issue.18
, pp. 3433-3452
-
-
Nezhad, A.A.1
Miri, A.2
Makrakis, D.3
-
23
-
-
36849024896
-
Sensor node compromise detection: The location perspective
-
Song H, Xie L, Zhu S, Cao G,. Sensor node compromise detection: the location perspective, Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing, 2007.
-
(2007)
Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing
-
-
Song, H.1
Xie, L.2
Zhu, S.3
Cao, G.4
-
24
-
-
51249084123
-
AICN: An efficient algorithm to identify compromised nodes in wireless sensor network
-
Lu R, Lin X, Zhang C, Zhu H, Ho PH, Shen X,. AICN: an efficient algorithm to identify compromised nodes in wireless sensor network, Proceedings of the IEEE International Conference on Communications (ICC '08), 2008.
-
(2008)
Proceedings of the IEEE International Conference on Communications (ICC '08)
-
-
Lu, R.1
Lin, X.2
Zhang, C.3
Zhu, H.4
Ho, P.H.5
Shen, X.6
-
25
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
DOI 10.1109/JSAC.2005.861382
-
Zhang Y, Liu W, Lou W, Fang Y,. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications 2006 24 (2): 247-260. (Pubitemid 43269747)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
27
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
Shao M, Yang Y, Zhu S, Cao G,. Towards statistically strong source anonymity for sensor networks, Proceedings of IEEE INFOCOM 2008, 2008; 51-55.
-
(2008)
Proceedings of IEEE INFOCOM 2008
, pp. 51-55
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
|