-
4
-
-
78650408178
-
Control based on data-aggregation for wireless sensor networks. In: Proc. of
-
ISIE 2010, Bari, Italy (July 2010)
-
Mastrocristino, T., Tesoriere, G., Grieco, L.A., Boggia, G., Palattella, M.R., Camarda, P.: Control based on data-aggregation for wireless sensor networks. In: Proc. of IEEE Int. Symp. on Industrial Electronics, ISIE 2010, Bari, Italy (July 2010)
-
IEEE Int. Symp. on Industrial Electronics
-
-
Mastrocristino, T.1
Tesoriere, G.2
Grieco, L.A.3
Boggia, G.4
Palattella, M.R.5
Camarda, P.6
-
5
-
-
77951429167
-
-
Proc. of The Third Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM, Sliema, Malta (October
-
Grieco, L.A., Boggia, G., Sicari, S., Colombo, P.: Secure wireless multimedia sensor networks: a survey. In: Proc. of The Third Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM, Sliema, Malta (October 2009)
-
(2009)
Secure Wireless Multimedia Sensor Networks: A Survey.
-
-
Grieco, L.A.1
Boggia, G.2
Sicari, S.3
Colombo, P.4
-
6
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 53 (2009)
-
(2009)
Computer Networks 53
-
-
Ozdemir, S.1
Xiao, Y.2
-
7
-
-
84959045053
-
-
Proc. of SEA 2007, Cambridge (MS), USA
-
Coen-Porisini, A., Colombo, P., Sicari, S., Trombetta, A.: A conceptual model for privacy policies. In: Proc. of SEA 2007, Cambridge (MS), USA (2007)
-
(2007)
A Conceptual Model for Privacy Policies.
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
Trombetta, A.4
-
8
-
-
77954712612
-
Dealing with anonymity in wireless sensor networks
-
Coen-Porisini, A., Colombo, P., Sicari, S.: Dealing with anonymity in wireless sensor networks. In: Proceedings of 25th Annual ACM Symposium on Applied Computing (ACM SAC), Sierre, Switzerland (2010)
-
(2010)
Proceedings of the ACM Symposium on Applied Computing
, pp. 2216-2223
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
-
12
-
-
0003187764
-
Directive 95/46/EC of the European Parliament
-
November 23
-
Directive 95/46/EC of the European Parliament. Official Journal of the European Communities, (L.281), 31 (November 23, 1995)
-
(1995)
Official Journal of the European Communities, L.281
, pp. 31
-
-
-
13
-
-
34548016110
-
Privacy-aware role based access control
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (2007)
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
14
-
-
34548455373
-
Reliable bursty convergecast in wireless sensor networks
-
Zhanga, H., Arorab, A., Choic, Y., Goudac, M.: Reliable bursty convergecast in wireless sensor networks. Elsevier Computer Communications 30(13), 2560-2576 (2007)
-
(2007)
Elsevier Computer Communications
, vol.30
, Issue.13
, pp. 2560-2576
-
-
Zhanga, H.1
Arorab, A.2
Choic, Y.3
Goudac, M.4
-
15
-
-
85043031259
-
Secure aggregation in hybrid mesh/sensor networks
-
St. Petersburg, Russia, October 12-13
-
Sicari, S., Riggio, R.: Secure aggregation in hybrid mesh/sensor networks. In: Proceeding of the IEEE International Workshop on Scalable Ad Hoc and Sensor Networks (SASN 2009), St. Petersburg, Russia, October 12-13 (2009)
-
(2009)
Proceeding of the IEEE International Workshop on Scalable Ad Hoc and Sensor Networks (SASN 2009)
-
-
Sicari, S.1
Riggio, R.2
-
17
-
-
85092924851
-
Privacy-aware location sensor networks
-
Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D.: Privacy-aware location sensor networks. In: Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems, HotOS IX (2003)
-
(2003)
Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems, HotOS IX
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
18
-
-
0142103313
-
Security and privacy in sensor networks
-
March
-
Chan, H., Perrig, A.: Security and privacy in sensor networks. IEEE Computer Magazine, 103-105 (March 2003)
-
(2003)
IEEE Computer Magazine
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
19
-
-
85043033114
-
Framework for security and privacy in automotive telematics
-
Duri, M.G.S., Liu, P.M.X., Perez, R., Singh, M., Tang, J.: Framework for security and privacy in automotive telematics. In: Proceedings of 2nd ACM International Worksphop on Mobile Commerce (2000)
-
(2000)
Proceedings of 2nd ACM International Worksphop on Mobile Commerce
-
-
Duri, M.G.S.1
Liu, P.M.X.2
Perez, R.3
Singh, M.4
Tang, J.5
-
20
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Computer Science Laboratory SRI International
-
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL- 98-04, Computer Science Laboratory, SRI International (1998)
-
(1998)
Technical Report SRI-CSL-98-04
-
-
Samarati, P.1
Sweeney, L.2
-
21
-
-
35048866963
-
A methodological assessment of location privacy risks in wireless hotspot networks
-
Springer, Heidelberg Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.)
-
Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 10-24. Springer, Heidelberg (2004)
-
(2004)
Security in Pervasive Computing. LNCS
, vol.2802
, pp. 10-24
-
-
Gruteser, M.1
Grunwald, D.2
-
22
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireless Networking 8(5), 521-534 (2002)
-
(2002)
Wireless Networking
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
24
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Molnar, D., Wagner, D.: Privacy and security in library rfid: Issues, practices, and architectures. In: Proceedings of ACM CCS (2004)
-
(2004)
Proceedings of Rftxt ACM CCS
-
-
Molnar, D.1
Wagner, D.2
-
25
-
-
34248672225
-
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
-
September
-
Yang, Y., Wang, X., Zhu, S., Cao, G.: Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. In: ACM MOBIHOC (September 2006)
-
(2006)
ACM MOBIHOC
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
26
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
DOI 10.1109/TMC.2006.144, 1683790
-
Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Trans. Mobile Comput. 5, 1417-1431 (2006) (Pubitemid 44335247)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
27
-
-
22944472278
-
Location sensing and privacy in a context aware computing environment
-
Smailagic, A., Siewiorek, D.P., Anhalt, J., Kogan, Y.W.D.: Location sensing and privacy in a context aware computing environment. In: Proceedings of Pervasive Computing (2001)
-
(2001)
Proceedings of Pervasive Computing
-
-
Smailagic, A.1
Siewiorek, D.P.2
Anhalt, J.3
Kogan, Y.W.D.4
|