-
1
-
-
49749093156
-
Participatory sensing
-
J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, et al., "Participatory sensing," in Proc. WSW, 2006, pp. 117-134.
-
(2006)
Proc. WSW
, pp. 117-134
-
-
Burke, J.1
Estrin, D.2
Hansen, M.3
Parker, A.4
Ramanathan, N.5
Reddy, S.6
-
2
-
-
84876811364
-
Sensing atmosphere
-
Jan
-
E. Paulos, R. Honicky, and E. Goodman, "Sensing atmosphere," in Proc. Sens. Syst. Workshops, Jan. 2007, pp. 1-6.
-
(2007)
Proc. Sens. Syst. Workshops
, pp. 1-6
-
-
Paulos, E.1
Honicky, R.2
Goodman, E.3
-
3
-
-
77955007905
-
ParkNet: Drive-by sensing of road-side parking statistics
-
S. Mathur, T. Jin, N. Kasturirangan, J. Chandrasekaran, W. Xue, M. Gruteser, et al., "ParkNet: Drive-by sensing of road-side parking statistics," in Proc. 8th Int. Conf. Mobile Syst., Appl., Services , 2010, pp. 123-136.
-
(2010)
Proc. 8th Int. Conf. Mobile Syst. Appl., Services
, pp. 123-136
-
-
Mathur, S.1
Jin, T.2
Kasturirangan, N.3
Chandrasekaran, J.4
Xue, W.5
Gruteser, M.6
-
4
-
-
77954977772
-
-
Stanford University Stanford, CA, USA [Online]. Available
-
Stanford University. (2010). Quake-Catcher Network, Stanford, CA, USA [Online]. Available: http://qcn.stanford.edu
-
(2010)
Quake-Catcher Network
-
-
-
5
-
-
45849092597
-
Automatic collection of fuel prices from a network of mobile cameras
-
Jun
-
Y. Dong, S. S. Kanhere, C. T. Chou, and N. Bulusu, "Automatic collection of fuel prices from a network of mobile cameras," in Proc. 4th IEEE Int. Conf. DCOSS, Jun. 2008, pp. 140-156.
-
(2008)
Proc. 4th IEEE Int. Conf. DCOSS
, pp. 140-156
-
-
Dong, Y.1
Kanhere, S.S.2
Chou, C.T.3
Bulusu, N.4
-
6
-
-
84891364043
-
MobiShop: Using mobile phones for sharing consumer pricing information
-
S. Sehgal, S. S. Kanhere, and C. T. Chou, "MobiShop: Using mobile phones for sharing consumer pricing information," in Proc. DCOSS, 2008, pp. 1-2.
-
(2008)
Proc. DCOSS
, pp. 1-2
-
-
Sehgal, S.1
Kanhere, S.S.2
Chou, C.T.3
-
7
-
-
77956355366
-
-
Nokia Research Center Sunnyvale, CA, USA [Online]. Available
-
Nokia Research Center. (2010). SensorPlanet, Sunnyvale, CA, USA [Online]. Available: http://research.nokia.com/research/ projects/sensorplanet
-
(2010)
SensorPlanet
-
-
-
8
-
-
77955002648
-
PRISM: Platform for remote sensing using smartphones
-
T. Das, P. Mohan, V. N. Padmanabhan, R. Ramjee, and A. Sharma, "PRISM: Platform for remote sensing using smartphones," in Proc. 8th Int. Conf. Mobile Syst., Appl., Services, 2010, pp. 63-76.
-
(2010)
Proc. 8th Int. Conf. Mobile Syst Appl., Services
, pp. 63-76
-
-
Das, T.1
Mohan, P.2
Padmanabhan, V.N.3
Ramjee, R.4
Sharma, A.5
-
9
-
-
77953494555
-
Recruitment framework for participatory sensing data collections
-
S. Reddy, D. Estrin, and M. B. Srivastava, "Recruitment framework for participatory sensing data collections," in Proc. 8th Int. Conf. Pervas. Comput., 2010, pp. 138-155.
-
(2010)
Proc. 8th Int. Conf. Pervas. Comput.
, pp. 138-155
-
-
Reddy, S.1
Estrin, D.2
Srivastava, M.B.3
-
10
-
-
67650844989
-
Sensor network security: A survey
-
Jun.
-
X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: A survey," IEEE Commun. Surv. Tuts., vol. 11, no. 2, pp. 52-73, Jun. 2009.
-
(2009)
IEEE Commun. Surv. Tuts.
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
11
-
-
77954021717
-
Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection
-
Aug.
-
K. Shilton, "Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection," Commun. ACM, vol. 52, no. 11, pp. 48-53, Aug. 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.11
, pp. 48-53
-
-
Shilton, K.1
-
12
-
-
66549119801
-
Opportunistic sensing: Security challenges for the new paradigm
-
Jan
-
A. Kapadia, D. Kotz, and N. Triandopoulos, "Opportunistic sensing: Security challenges for the new paradigm," in Proc. IEEE 1st Int. Commun. Syst. Netw. Workshops, Jan. 2009, pp. 1-10.
-
(2009)
Proc. IEEE 1st Int. Commun. Syst. Netw. Workshops
, pp. 1-10
-
-
Kapadia, A.1
Kotz, D.2
Triandopoulos, N.3
-
13
-
-
77958449487
-
Security and privacy objectives for sensing applications in wireless community networks
-
Aug
-
D. Christin, M. Hollick, and M. Manulis, "Security and privacy objectives for sensing applications in wireless community networks," in Proc. IEEE ICCCN, Aug. 2010, pp. 1-6.
-
(2010)
Proc. IEEE ICCCN
, pp. 1-6
-
-
Christin, D.1
Hollick, M.2
Manulis, M.3
-
14
-
-
80052696161
-
A survey on privacy in mobile participatory sensing applications
-
D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick, "A survey on privacy in mobile participatory sensing applications," J. Syst. Softw., vol. 84, no. 11, pp. 1928-1946, 2011.
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.11
, pp. 1928-1946
-
-
Christin, D.1
Reinhardt, A.2
Kanhere, S.S.3
Hollick, M.4
-
15
-
-
57349110591
-
AnonySense: Privacy-aware people-centric sensing
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, "AnonySense: Privacy-aware people-centric sensing," in Proc. 6th Int. Conf. Mobile Syst., Appl., Services, 2008, pp. 211-224.
-
(2008)
Proc. 6th Int. Conf. Mobile Syst., Appl., Services
, pp. 211-224
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Triandopoulos, N.6
-
16
-
-
79551682845
-
AnonySense: A system for anonymous opportunistic sensing
-
M. Shin, C. Cornelius, D. Peebles, A. Kapadia, D. Kotz, and N. Triandopoulos, "AnonySense: A system for anonymous opportunistic sensing," Pervas. Mobile Comput., vol. 7, no. 1, pp. 16-30, 2011.
-
(2011)
Pervas. Mobile Comput.
, vol.7
, Issue.1
, pp. 16-30
-
-
Shin, M.1
Cornelius, C.2
Peebles, D.3
Kapadia, A.4
Kotz, D.5
Triandopoulos, N.6
-
17
-
-
77955274113
-
Preserving privacy in participatory sensing systems
-
Jul.
-
K. L. Huang, S. S. Kanhere, and W. Hu, "Preserving privacy in participatory sensing systems," Comput. Commun., vol. 33, no. 11, pp. 1266-1280, Jul. 2010.
-
(2010)
Comput. Commun.
, vol.33
, Issue.11
, pp. 1266-1280
-
-
Huang, K.L.1
Kanhere, S.S.2
Hu, W.3
-
18
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
19
-
-
0036811662
-
Anonymity: A model for protecting privacy
-
L. Sweeney, "Anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness Knowl., Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness Knowl., Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
20
-
-
34248181923
-
L-diversity: Privacy beyond ?-anonymity
-
Mar.
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond ?-anonymity," ACM Trans. Knowl. Discovery Data, vol. 1, no. 1, pp. 1-3, Mar. 2007.
-
(2007)
ACM Trans. Knowl. Discovery Data
, vol.1
, Issue.1
, pp. 1-3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
21
-
-
84870510126
-
Virtual individual servers as privacy-preserving proxies for mobile devices
-
Syst., Appl Mobile Handhelds
-
R. Cáceres, L. P. Cox, H. Lim, A. Shakimov, and A. Varshavsky, "Virtual individual servers as privacy-preserving proxies for mobile devices," in Proc. 1st ACM Workshop Netw., Syst., Appl. Mobile Handhelds, 2009, pp. 37-42.
-
(2009)
Proc. 1st ACM Workshop Netw.
, pp. 37-42
-
-
Cáceres, R.1
Cox, L.P.2
Lim, H.3
Shakimov, A.4
Varshavsky, A.5
-
22
-
-
84866489655
-
PoolView: Stream privacy for grassroots participatory sensing
-
Nov
-
R. K. Ganti, N. Pham, Y.-E. Tsai, and T. F. Abdelzaher, "PoolView: Stream privacy for grassroots participatory sensing," in Proc. 6th ACM Conf. Embedded Netw. Sensor Syst., Nov. 2008, pp. 281-294.
-
(2008)
Proc. 6th ACM Conf. Embedded Netw. Sensor Syst.
, pp. 281-294
-
-
Ganti, R.K.1
Pham, N.2
Tsai, Y.-E.3
Abdelzaher, T.F.4
-
23
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, "Differential privacy," in Proc. ICALP, 2006, pp. 1-12. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
24
-
-
77953308558
-
PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems
-
Mar
-
J. Shi, R. Zhang, Y. Liu, and Y. Zhang, "PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems," in Proc. IEEE INFOCOM, Mar. 2010, pp. 758-766.
-
(2010)
Proc. IEEE INFOCOM
, pp. 758-766
-
-
Shi, J.1
Zhang, R.2
Liu, Y.3
Zhang, Y.4
-
25
-
-
84859028284
-
Towards trustworthy participatory sensing
-
A. Dua, N. Bulusu, W. C. Feng, and W. Hu, "Towards trustworthy participatory sensing," in Proc. 4th Usenix Workshop Hot Topics Sec., 2009, pp. 1-6.
-
(2009)
Proc. 4th Usenix Workshop Hot Topics Sec.
, pp. 1-6
-
-
Dua, A.1
Bulusu, N.2
Feng, W.C.3
Hu, W.4
-
26
-
-
77951556632
-
Toward trustworthy mobile sensing
-
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, "Toward trustworthy mobile sensing," in Proc. 11th Workshop Mobile Comput. Syst. Appl., 2010, pp. 31-36.
-
(2010)
Proc. 11th Workshop Mobile Comput. Syst. Appl.
, pp. 31-36
-
-
Gilbert, P.1
Cox, L.P.2
Jung, J.3
Wetherall, D.4
-
28
-
-
77953965556
-
Biketastic: Sensing and mapping for better biking
-
S. Reddy, K. Shilton, G. Denisov, C. Cenizal, D. Estrin, and M. B. Srivastava, "Biketastic: Sensing and mapping for better biking," in Proc. SIGCHI Conf. Human Factors Comput. Syst., 2010, pp. 1817-1820.
-
(2010)
Proc. SIGCHI Conf. Human Factors Comput. Syst.
, pp. 1817-1820
-
-
Reddy, S.1
Shilton, K.2
Denisov, G.3
Cenizal, C.4
Estrin, D.5
Srivastava, M.B.6
-
29
-
-
85076493348
-
The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion
-
S. Meiklejohn, K. Mowery, S. Checkoway, and H. Shacham, "The phantom tollbooth: Privacy-preserving electronic toll collection in the presence of driver collusion," in Proc. USENIX Sec. Symp., 2011, pp. 1-16.
-
(2011)
Proc. USENIX Sec. Symp.
, pp. 1-16
-
-
Meiklejohn, S.1
Mowery, K.2
Checkoway, S.3
Shacham, H.4
-
30
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in Proc. 21st Annu. Int. Cryptol. Conf., Aug. 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes In Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
31
-
-
38149091799
-
Blind identity-based encryption and simulatable oblivious transfer
-
New York NY, USA: Springer-Verlag, Jun
-
M. Green and S. Hohenberger, "Blind identity-based encryption and simulatable oblivious transfer," in ASIACRYPT. New York, NY, USA: Springer-Verlag, Jun. 2007, pp. 265-282.
-
(2007)
ASIACRYPT
, pp. 265-282
-
-
Green, M.1
Hohenberger, S.2
-
32
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold, "Keyword search and oblivious pseudorandom functions," in Theory of Cryptography, New York, NY, USA: Springer-Verlag, 2005, pp. 303-324. (Pubitemid 41231171)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
33
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
M. Naor and O. Reingold, "Number-theoretic constructions of efficient pseudo-random functions," in Proc. FOCS, 1997, pp. 458-467.
-
(1997)
Proc. FOCS
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
34
-
-
67650320950
-
A survey of computational location privacy
-
Aug
-
J. Krumm, "A survey of computational location privacy," Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 391-399, Aug. 2009.
-
(2009)
Pers. Ubiquitous Comput.
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
35
-
-
2942524994
-
Location privacy in pervasive computing
-
Jan.
-
A. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervas. Comput., vol. 2, no. 1, pp. 46-55, Jan. 2003.
-
(2003)
IEEE Pervas. Comput.
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
37
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proc. CRYPTO, 2005, pp. 258-275. (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
38
-
-
77958056561
-
Fast secure computation of set intersection
-
S. Jarecki and X. Liu, "Fast secure computation of set intersection," in Proc. 7th Int. Conf. SCN, 2010, pp. 418-435.
-
(2010)
Proc. 7th Int. Conf. SCN
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
39
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Apr
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Apr. 2011, pp. 829-837.
-
(2011)
Proc. IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
40
-
-
74049149270
-
Secure anonymous database search
-
M. Raykova, B. Vo, S. M. Bellovin, and T. Malkin, "Secure anonymous database search," in Proc. CCSW, 2009, pp. 115-126.
-
(2009)
Proc. CCSW
, pp. 115-126
-
-
Raykova, M.1
Vo, B.2
Bellovin, S.M.3
Malkin, T.4
-
41
-
-
84888336663
-
Salus: A system for server-aided secure function evaluation
-
S. Kamara, P. Mohassel, and B. Riva, "Salus: A system for server-aided secure function evaluation," in Proc. CCS, 2012, pp. 1-26.
-
(2012)
Proc. CCS
, pp. 1-26
-
-
Kamara, S.1
Mohassel, P.2
Riva, B.3
-
42
-
-
84883080924
-
ARTSense: Anonymous reputation and trust in participatory sensing
-
X. O. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher, "ARTSense: Anonymous reputation and trust in participatory sensing," in Proc. INFOCOM, 2013, pp. 1-9.
-
(2013)
Proc. INFOCOM
, pp. 1-9
-
-
Wang, X.O.1
Cheng, W.2
Mohapatra, P.3
Abdelzaher, T.4
-
43
-
-
84943315771
-
Are you contributing trustworthy data? The case for a reputation system in participatory sensing
-
K. L. Huang, S. S. Kanhere, and W. Hu, "Are you contributing trustworthy data? The case for a reputation system in participatory sensing," in Proc. MSWiM, 2010, pp. 1-9.
-
(2010)
Proc. MSWiM
, pp. 1-9
-
-
Huang, K.L.1
Kanhere, S.S.2
Hu, W.3
-
44
-
-
62449110159
-
Static security optimization for real time systems
-
Feb.
-
M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, et al., "Static security optimization for real time systems," IEEE Trans. Ind. Inf., vol. 5, no. 1, pp. 22-37, Feb. 2009.
-
(2009)
IEEE Trans. Ind. Inf.
, vol.5
, Issue.1
, pp. 22-37
-
-
Lin, M.1
Xu, L.2
Yang, L.T.3
Qin, X.4
Zheng, N.5
Wu, Z.6
-
45
-
-
33645215766
-
Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
-
Apr.
-
Z. Shao, C. Xue, Q. Zhuge, M. K. Q. Xiao, and E. H.-M. Sha, "Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software," IEEE Trans. Comput., vol. 55, no. 4, pp. 443-453, Apr. 2006.
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.4
, pp. 443-453
-
-
Shao, Z.1
Xue, C.2
Zhuge, Q.3
Xiao, M.K.Q.4
Sha, E.H.-M.5
-
46
-
-
84875212881
-
Securityaware optimization for ubiquitous computing systems with seat graph approach
-
M. Qiu, L. Zhang, Z. Ming, Z. Chen, X. Qin, and L. T. Yang, "Securityaware optimization for ubiquitous computing systems with seat graph approach," J. Comput. Syst. Sci., vol. 79, no. 5, pp. 518-529, 2013.
-
(2013)
J. Comput. Syst. Sci.
, vol.79
, Issue.5
, pp. 518-529
-
-
Qiu, M.1
Zhang, L.2
Ming, Z.3
Chen, Z.4
Qin, X.5
Yang, L.T.6
-
47
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of chaum's blind signature scheme
-
DOI 10.1007/s00145-002-0120-1
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, "The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme," J. Cryptol., vol.16, no. 3, pp. 185-215, 2003. (Pubitemid 41201209)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
50
-
-
84944878354
-
-
Boca Raton, FL, USA: CRC Press
-
A. Menezes, P. Van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
52
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
DOI 10.1016/j.dss.2005.05.019, PII S0167923605000849
-
A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Syst., vol. 43, no. 2, pp. 618-644, 2007. (Pubitemid 46216533)
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
|