-
1
-
-
14844303406
-
Source-location privacy in energy-constrained sensor network routing
-
C. Ozturk and Y. Zhang, "Source-location privacy in energy-constrained sensor network routing, " In ACM SASN, pp. 88-93, 2004.
-
(2004)
ACM SASN
, pp. 88-93
-
-
Ozturk, C.1
Zhang, Y.2
-
2
-
-
49249085644
-
Transactional confidentiality in sensor networks
-
S. Pai, S. Bermudez, S. B. Wicker, M. Meingast, T. Roosta, S. Sastry, and D. K. Mulligan, "Transactional confidentiality in sensor networks, " IEEE Security Privacy, vol. 6, no. 4, pp. 28-35, 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.4
, pp. 28-35
-
-
Pai, S.1
Bermudez, S.2
Wicker, S.B.3
Meingast, M.4
Roosta, T.5
Sastry, S.6
Mulligan, D.K.7
-
3
-
-
84870866387
-
Computational intelligence for user and data classification in hospital software development
-
M. Mohammadian, D. Hatzinakos, and P. Spachos, "Computational intelligence for user and data classification in hospital software development, " International Conference on AIAI, pp. 145-154, 2012.
-
(2012)
International Conference on AIAI
, pp. 145-154
-
-
Mohammadian, M.1
Hatzinakos, D.2
Spachos, P.3
-
4
-
-
77955500884
-
Achieving network level privacy in wireless sensor networks
-
R. A. Shaikh, H. Jameel, B. J. DAuriol, H. Lee, S. Lee, and Y. J. Song, "Achieving network level privacy in wireless sensor networks, " Sensors, vol. 10, no. 3, pp. 1447-1472, 2010.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 1447-1472
-
-
Shaikh, R.A.1
Jameel, H.2
Dauriol, B.J.3
Lee, H.4
Lee, S.5
Song, Y.J.6
-
5
-
-
27944449345
-
Enhancing sourcelocation privacy in sensor network routing
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing sourcelocation privacy in sensor network routing, " IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 599-608, 2005.
-
(2005)
IEEE International Conference on Distributed Computing Systems (ICDCS)
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
7
-
-
51249113844
-
A source-location privacy protocol in wsn based on locational angle
-
W. Wei-Ping, C. Liang, and W. Jian-xin, "A source-location privacy protocol in wsn based on locational angle, " IEEE International Conference on Communications (ICC), pp. 1630-1634, 2008.
-
(2008)
IEEE International Conference on Communications (ICC)
, pp. 1630-1634
-
-
Wei-Ping, W.1
Liang, C.2
Jian-Xin, W.3
-
9
-
-
70449419921
-
Routing-based source-location privacy protection in wireless sensor networks
-
Y. Li, L. Lightfoot, and J Ren, "Routing-based source-location privacy protection in wireless sensor networks, " IEEE International Conference on Electro/Information Technology, pp. 29-34, 2009.
-
(2009)
IEEE International Conference on Electro/Information Technology
, pp. 29-34
-
-
Li, Y.1
Lightfoot, L.2
Ren, J.3
-
10
-
-
79551649009
-
Preserving source-location privacy in wireless sensor network using star routing
-
L. Lightfoot, Y. Li, and J. Ren, "Preserving source-location privacy in wireless sensor network using star routing, " Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, pp. 1-5, 2010.
-
(2010)
Global Telecommunications Conference (GLOBECOM 2010) 2010 IEEE
, pp. 1-5
-
-
Lightfoot, L.1
Li, Y.2
Ren, J.3
-
11
-
-
33847350601
-
Effective probabilistic approach protecting sensor traffic
-
X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, "Effective probabilistic approach protecting sensor traffic, " Military Communications Conference, 2005. MILCOM 2005. IEEE, pp. 169-175 Vol. 1, 2005.
-
(2005)
Military Communications Conference 2005. MILCOM 2005. IEEE
, vol.1
, pp. 169-175
-
-
Hong, X.1
Wang, P.2
Kong, J.3
Zheng, Q.4
Liu, J.5
-
12
-
-
77954351987
-
Opportunistic routing for enhanced source-location privacy in wireless sensor networks
-
May
-
P. Spachos, L. Song, and D. Hatzinakos, "Opportunistic routing for enhanced source-location privacy in wireless sensor networks, " Biennial Symposium on Communications (QBSC), pp. 315-318, May 2010.
-
(2010)
Biennial Symposium on Communications (QBSC)
, pp. 315-318
-
-
Spachos, P.1
Song, L.2
Hatzinakos, D.3
-
13
-
-
80052734065
-
Improving sourcelocation privacy through opportunistic routing in wireless sensor networks
-
P. Spachos, L. Song, F. M. Bui, and D. Hatzinakos, "Improving sourcelocation privacy through opportunistic routing in wireless sensor networks, " Computers and Communications (ISCC), 2011 IEEE Symposium on, pp. 815-820, 2011.
-
(2011)
Computers and Communications (ISCC) 2011 IEEE Symposium on
, pp. 815-820
-
-
Spachos, P.1
Song, L.2
Bui, F.M.3
Hatzinakos, D.4
-
14
-
-
84881316459
-
Providing source location privacy in wireless sensor networks: A survey
-
M. Conti, J. Willemsen, and B. Crispo, "Providing source location privacy in wireless sensor networks: A survey, " IEEE Communications Surveys Tutorials, vol. 15, no. 3, pp. 1238-1280, 2013.
-
(2013)
IEEE Communications Surveys Tutorials
, vol.15
, Issue.3
, pp. 1238-1280
-
-
Conti, M.1
Willemsen, J.2
Crispo, B.3
-
15
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks, " IEEE Journal on Selected Areas in Communications, vol. 24, no. 4, pp. 829-835, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
|