메뉴 건너뛰기




Volumn , Issue , 2015, Pages 337-348

The limits of the trade-off between query-anonymity and communication-cost in wireless sensor networks

Author keywords

Query anonymity; Wireless sensor networks

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; SENSOR NODES; TOPOLOGY; TREES (MATHEMATICS); WIRELESS SENSOR NETWORKS;

EID: 84928139017     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2699026.2699113     Document Type: Conference Paper
Times cited : (5)

References (23)
  • 2
    • 3042699909 scopus 로고    scopus 로고
    • Measuring anonymity: The disclosure attack
    • D. Agrawal and D. Kedogan. Measuring anonymity: The disclosure attack. IEEE Security & privacy, 1(6):27-34, 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6 , pp. 27-34
    • Agrawal, D.1    Kedogan, D.2
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, Return addresses, and digital pseudonyms
    • Feb.
    • D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM, 24(2):84-90, Feb. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 7
    • 84905828657 scopus 로고    scopus 로고
    • Last accessed: September
    • Crossbow Technology, Inc. MICAz Wireless Measurement System. http://www.openautomation.net/uploadsproductos/micaz-datasheet.pdf. Last accessed: September 2014.
    • (2014) MICAz Wireless Measurement System.
  • 10
    • 0003979335 scopus 로고    scopus 로고
    • Basic Applications. Cambridge University Press, New York, NY, USA, 1st edition
    • O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York, NY, USA, 1st edition, 2009.
    • (2009) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 11
    • 35248900308 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • Springer
    • D. Kedogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In Information Hiding, pages 53-69. Springer, 2003.
    • (2003) Information Hiding , pp. 53-69
    • Kedogan, D.1    Agrawal, D.2    Penz, S.3
  • 12
    • 59849111340 scopus 로고    scopus 로고
    • PhD thesis, Carnegie Mellon University, July Available from
    • L. Kissner. Privacy-Preserving Distributed Information Sharing. PhD thesis, Carnegie Mellon University, July 2006. Available from http: //www.cs.cmu.edu/~leak/papers/thesis.pdf.
    • (2006) Privacy-Preserving Distributed Information Sharing.
    • Kissner, L.1
  • 17
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • Springer
    • J.-F. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Designing Privacy Enhancing Technologies, pages 10-29. Springer, 2001.
    • (2001) Designing Privacy Enhancing Technologies , pp. 10-29
    • Raymond, J.-F.1
  • 18
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • Nov.
    • M. K. Reiter and A. D. Rubin. Crowds: Anonymity for Web Transactions. ACM Trans. Inf. Syst. Secur., 1(1):66-92, Nov. 1998.
    • (1998) ACM Trans. Inf. Syst. Secur. , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.