-
1
-
-
84964636134
-
The Internet of things will change our world
-
Keynote. URL
-
Links, C., The Internet of things will change our world. ERCIM News(101), 2015, 3 Keynote. URL https://ercim-news.ercim.eu/images/stories/EN101/EN101-web.pdf.
-
(2015)
ERCIM News
, Issue.101
, pp. 3
-
-
Links, C.1
-
2
-
-
85019926380
-
How The Internet Of Things Will Change (And Improve) Our Everyday Lives
-
(Accessed: 03/2017) (Oct)
-
H. Green, How The Internet Of Things Will Change (And Improve) Our Everyday Lives, https://www.forbes.com/sites/ibm/2016/10/04/how-the-internet-of-things-will-change-and-improve-our-everyday-lives/ (Accessed: 03/2017) (Oct 2016).
-
(2016)
-
-
Green, H.1
-
3
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57:10 (2013), 2266–2279, 10.1016/j.comnet.2012.12.018.
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
4
-
-
85019923460
-
-
ards Association, IoT Architecture - Internet of Things (IoT) Architecture, (Accessed: 02/2017)
-
IEEE Standards Association, IoT Architecture - Internet of Things (IoT) Architecture, https://standards.ieee.org/develop/wg/IoT_Architecture.html (Accessed: 02/2017) (2016).
-
(2016)
-
-
St, I.E.E.E.1
-
5
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M., Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29:7 (2013), 1645–1660, 10.1016/j.future.2013.01.010.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
6
-
-
85019857627
-
-
5G Security: Forward Thinking, (Accessed: 02/2017)
-
Huawei Technologies Co., Ltd., 5G Security: Forward Thinking, http://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf (Accessed: 02/2017) (2015).
-
(2015)
-
-
Huawei Technologies Co., Ltd.,1
-
7
-
-
85019830912
-
-
5G Security - Scenarios and Solutions, (Accessed: 02/2017)
-
Ericsson AB, 5G Security - Scenarios and Solutions, https://www.ericsson.com/res/docs/whitepapers/wp-5g-security.pdf (Accessed: 02/2017) (2015).
-
(2015)
-
-
Ericsson, A.B.1
-
8
-
-
85019844581
-
-
NGMN 5G White Paper, (Accessed: 02/2017)
-
Next Generation Mobile Networks, NGMN 5G White Paper, https://www.ngmn.org/uploads/media/NGMN_5G_White_Paper_V1_0.pdf (Accessed: 02/2017) (2015).
-
(2015)
-
-
Next Generation Mobile Networks1
-
9
-
-
84957841635
-
The internet of things (iot) and its impact on individual privacy: An australian perspective
-
URL
-
Caron, X., Bosua, R., Maynard, S.B., Ahmad, A., The internet of things (iot) and its impact on individual privacy: An australian perspective. Comput. Law Secur. Rev. 32:1 (2016), 4–15, 10.1016/j.clsr.2015.12.001 URL http://www.sciencedirect.com/science/article/pii/S0267364915001661.
-
(2016)
Comput. Law Secur. Rev.
, vol.32
, Issue.1
, pp. 4-15
-
-
Caron, X.1
Bosua, R.2
Maynard, S.B.3
Ahmad, A.4
-
10
-
-
84911900606
-
Privacy in the internet of things: threats andchallenges
-
Ziegeldorf, J.H., Morchon, O.G., Wehrle, K., Privacy in the internet of things: threats andchallenges. Secur. Commun. Netw. 7:12 (2014), 2728–2742, 10.1002/sec.795.
-
(2014)
Secur. Commun. Netw.
, vol.7
, Issue.12
, pp. 2728-2742
-
-
Ziegeldorf, J.H.1
Morchon, O.G.2
Wehrle, K.3
-
11
-
-
84973883690
-
The quest for privacy in the internet of things
-
Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A., Vasilakos, A.V., The quest for privacy in the internet of things. IEEE Cloud Comput. 3:2 (2016), 36–45, 10.1109/MCC.2016.28.
-
(2016)
IEEE Cloud Comput.
, vol.3
, Issue.2
, pp. 36-45
-
-
Porambage, P.1
Ylianttila, M.2
Schmitt, C.3
Kumar, P.4
Gurtov, A.5
Vasilakos, A.V.6
-
12
-
-
84857300683
-
Analysis of location privacy solutions in wireless sensor networks
-
Rios, R., Lopez, J., Analysis of location privacy solutions in wireless sensor networks. IET Commun. 5 (2011), 2518–2532, 10.1049/iet-com.2010.0825.
-
(2011)
IET Commun.
, vol.5
, pp. 2518-2532
-
-
Rios, R.1
Lopez, J.2
-
13
-
-
84876786771
-
(Un)suitability of anonymous communication systems to WSN
-
Rios, R., Lopez, J., (Un)suitability of anonymous communication systems to WSN. IEEE Syst. J. 7:2 (2013), 298–310, 10.1109/JSYST.2012.2221956.
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.2
, pp. 298-310
-
-
Rios, R.1
Lopez, J.2
-
14
-
-
84870459478
-
Information privacy?!
-
Camenisch, J., Information privacy?!. Comput. Netw. 56 (2012), 3834–3848, 10.1016/j.comnet.2012.10.012.
-
(2012)
Comput. Netw.
, vol.56
, pp. 3834-3848
-
-
Camenisch, J.1
-
15
-
-
85019872617
-
-
AVG can sell your browsing and search history to advertisers, (Accessed: 02/2017) (Sept).
-
J. Temperton, AVG can sell your browsing and search history to advertisers, http://www.wired.co.uk/news/archive/2015-09/17/avg-privacy-policy-browser-search-data (Accessed: 02/2017) (Sept 2015).
-
(2015)
-
-
Temperton, J.1
-
16
-
-
85019959518
-
-
Popular ID app could sell YOUR personal data to third-parties, without you even knowing it, (Accessed: 02/2017) (Aug)
-
J. Parsons, Popular ID app could sell YOUR personal data to third-parties, without you even knowing it, http://www.mirror.co.uk/news/technology-science/technology/popular-id-app-could-sell-6205624 (Accessed: 02/2017) (Aug 2015).
-
(2015)
-
-
Parsons, J.1
-
17
-
-
84944317103
-
Design and technical evaluation of an implantable passive sensor for minimally invasive wireless intracranial pressure monitoring
-
Springer
-
Behfar, M., Moradi, E., Bjrninen, T., Sydnheimo, L., Ukkonen, L., Design and technical evaluation of an implantable passive sensor for minimally invasive wireless intracranial pressure monitoring. World Congress on Medical Physics and Biomedical Engineering, Vol. 51, 2015, Springer, 1301–1304, 10.1007/978-3-319-19387-8_316.
-
(2015)
World Congress on Medical Physics and Biomedical Engineering, Vol. 51
, pp. 1301-1304
-
-
Behfar, M.1
Moradi, E.2
Bjrninen, T.3
Sydnheimo, L.4
Ukkonen, L.5
-
18
-
-
85019833897
-
-
Privacy and Freedom, first ed., New York Atheneum
-
A.F. Westin, Privacy and Freedom, first ed., New York Atheneum, 1967.
-
(1967)
-
-
Westin, A.F.1
-
19
-
-
84933053491
-
What was samsung thinking?
-
Landau, S., What was samsung thinking?. IEEE Secur. Privacy 13:3 (2015), 3–4, 10.1109/MSP.2015.63.
-
(2015)
IEEE Secur. Privacy
, vol.13
, Issue.3
, pp. 3-4
-
-
Landau, S.1
-
20
-
-
85019917886
-
-
15 worst internet privacy scandals of all time, (Accessed: 02/2017)
-
C.D. Marsan, 15 worst internet privacy scandals of all time, http://www.networkworld.com/article/2185187/security/15-worst-internet-privacy-scandals-of-all-time.html (Accessed: 02/2017) (2012).
-
(2012)
-
-
Marsan, C.D.1
-
21
-
-
67651030465
-
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
-
Castelluccia, C., Chan, A.C.-F., Mykletun, E., Tsudik, G., Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5:3 (2009), 20:1–20:36, 10.1145/1525856.1525858.
-
(2009)
ACM Trans. Sensor Netw.
, vol.5
, Issue.3
, pp. 201-20:36
-
-
Castelluccia, C.1
Chan, A.C.-F.2
Mykletun, E.3
Tsudik, G.4
-
22
-
-
84921731757
-
Confidentiality and integrity for data aggregation in wsn using homomorphic encryption
-
Othman, S., Bahattab, A., Trad, A., Youssef, H., Confidentiality and integrity for data aggregation in wsn using homomorphic encryption. Wirel. Pers. Commun. 80:2 (2015), 867–889, 10.1007/s11277-014-2061-z.
-
(2015)
Wirel. Pers. Commun.
, vol.80
, Issue.2
, pp. 867-889
-
-
Othman, S.1
Bahattab, A.2
Trad, A.3
Youssef, H.4
-
23
-
-
84862787823
-
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
-
Chen, C.-M., Lin, Y.-H., Lin, Y.-C., Sun, H.-M., RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23:4 (2012), 727–734, 10.1109/TPDS.2011.219.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.4
, pp. 727-734
-
-
Chen, C.-M.1
Lin, Y.-H.2
Lin, Y.-C.3
Sun, H.-M.4
-
24
-
-
84878316913
-
CDAMA: Concealed data aggregation scheme for multiple applications in wireless sensor networks
-
Lin, Y.-H., Chang, S.-Y., Sun, H.-M., CDAMA: Concealed data aggregation scheme for multiple applications in wireless sensor networks. IEEE Trans. Knowl. Data Eng. 25:7 (2013), 1471–1483, 10.1109/TKDE.2012.94.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, Issue.7
, pp. 1471-1483
-
-
Lin, Y.-H.1
Chang, S.-Y.2
Sun, H.-M.3
-
25
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
W. He, X. Liu, H. Nguyen, K. Nahrstedt, T. Abdelzaher, PDA: Privacy-preserving data aggregation in wireless sensor networks, in: 26th IEEE International Conference on Computer Communications, 2007, pp. 2045–2053. http://dx.doi.org/10.1109/INFCOM.2007.237.
-
(2007)
26th IEEE International Conference on Computer Communications
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
26
-
-
84877970558
-
Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks
-
427275
-
Yang, G., Li, S., Xu, X., Dai, H., Yang, Z., Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks. Int. J. Distrib. Sens. Netw., 2013(427275), 2013, 12, 10.1155/2013/427275.
-
(2013)
Int. J. Distrib. Sens. Netw.
, vol.2013
, pp. 12
-
-
Yang, G.1
Li, S.2
Xu, X.3
Dai, H.4
Yang, Z.5
-
27
-
-
49149125693
-
GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data
-
IEEE Computer Society
-
Zhang, W., Wang, C., Feng, T., GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data. IEEE International Conference on Pervasive Computing and Communications, (PerCom 2008), 2008, IEEE Computer Society, 179–184, 10.1109/PERCOM.2008.60.
-
(2008)
IEEE International Conference on Pervasive Computing and Communications, (PerCom 2008)
, pp. 179-184
-
-
Zhang, W.1
Wang, C.2
Feng, T.3
-
28
-
-
79960854358
-
KIPDA: k-Indistinguishable privacy-preserving data aggregation in wireless sensor networks
-
IEEE
-
Groat, M.M., Hey, W., Forrest, S., KIPDA: k-Indistinguishable privacy-preserving data aggregation in wireless sensor networks. IEEE INFOCOM 2011, 2011, IEEE, 2024–2032.
-
(2011)
IEEE INFOCOM 2011
, pp. 2024-2032
-
-
Groat, M.M.1
Hey, W.2
Forrest, S.3
-
29
-
-
84923029609
-
PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks
-
Ozdemir, S., Peng, M., Xiao, Y., PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks. Wirel. Commun. Mob. Comput. 15:4 (2015), 615–628, 10.1002/wcm.2369.
-
(2015)
Wirel. Commun. Mob. Comput.
, vol.15
, Issue.4
, pp. 615-628
-
-
Ozdemir, S.1
Peng, M.2
Xiao, Y.3
-
30
-
-
84891063786
-
Privacy-enhanced data aggregation scheme against internal attackers in smart grid
-
Fan, C.-I., Huang, S.-Y., Lai, Y.-L., Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Ind. Inf. 10:1 (2014), 666–675, 10.1109/TII.2013.2277938.
-
(2014)
IEEE Trans. Ind. Inf.
, vol.10
, Issue.1
, pp. 666-675
-
-
Fan, C.-I.1
Huang, S.-Y.2
Lai, Y.-L.3
-
31
-
-
78751642439
-
Location privacy and resilience in wireless sensor networks querying
-
Di Pietro, R., Viejo, A., Location privacy and resilience in wireless sensor networks querying. Comput. Commun. 34:3 (2011), 515–523, 10.1016/j.comcom.2010.05.014.
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 515-523
-
-
Di Pietro, R.1
Viejo, A.2
-
32
-
-
77749271080
-
Query privacy in wireless sensor networks
-
Carbunar, B., Yu, Y., Shi, W., Pearce, M., Vasudevan, V., Query privacy in wireless sensor networks. ACM Trans. Sensor Netw. 6:2 (2010), 14:1–14:34, 10.1145/1689239.1689244.
-
(2010)
ACM Trans. Sensor Netw.
, vol.6
, Issue.2
, pp. 141-14:34
-
-
Carbunar, B.1
Yu, Y.2
Shi, W.3
Pearce, M.4
Vasudevan, V.5
-
33
-
-
70449116305
-
Privacy-preserving querying in sensor networks
-
IEEE Computer Society San Francisco, CA
-
De Cristofaro, E., Ding, X., Tsudik, G., Privacy-preserving querying in sensor networks. 18th International Conference on Computer Communications and Networks, ICCCN '09, 2009, IEEE Computer Society, San Francisco, CA, 1–6, 10.1109/ICCCN.2009.5235352.
-
(2009)
18th International Conference on Computer Communications and Networks, ICCCN '09
, pp. 1-6
-
-
De Cristofaro, E.1
Ding, X.2
Tsudik, G.3
-
35
-
-
84928139017
-
The limits of the trade-off between query-anonymity and communication-cost in wireless sensor networks
-
ACM
-
Hayawi, K., Mortezaei, A., Tripunitara, M.V., The limits of the trade-off between query-anonymity and communication-cost in wireless sensor networks. 5th ACM Conference on Data and Application Security and Privacy, CODASPY’15, 2015, ACM, 337–348, 10.1145/2699026.2699113.
-
(2015)
5th ACM Conference on Data and Application Security and Privacy, CODASPY’15
, pp. 337-348
-
-
Hayawi, K.1
Mortezaei, A.2
Tripunitara, M.V.3
-
36
-
-
77950365227
-
Private information retrieval
-
Yekhanin, S., Private information retrieval. Commun. ACM 53:4 (2010), 68–73, 10.1145/1721654.1721674.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 68-73
-
-
Yekhanin, S.1
-
37
-
-
49249085644
-
Transactional confidentiality in sensor networks
-
Pai, S., Bermudez, S., Wicker, S., Meingast, M., Roosta, T., Sastry, S., Mulligan, D., Transactional confidentiality in sensor networks. IEEE Secur. Privacy 6:4 (2008), 28–35, 10.1109/MSP.2008.107.
-
(2008)
IEEE Secur. Privacy
, vol.6
, Issue.4
, pp. 28-35
-
-
Pai, S.1
Bermudez, S.2
Wicker, S.3
Meingast, M.4
Roosta, T.5
Sastry, S.6
Mulligan, D.7
-
38
-
-
34848852681
-
Temporal privacy in wireless sensor networks
-
IEEE Computer Society
-
Kamat, P., Xu, W., Trappe, W., Zhang, Y., Temporal privacy in wireless sensor networks. Proceedings of the 27th International Conference on Distributed Computing Systems, (ICDCS’07), 2007, IEEE Computer Society, 23, 10.1109/ICDCS.2007.146.
-
(2007)
Proceedings of the 27th International Conference on Distributed Computing Systems, (ICDCS’07)
, pp. 23
-
-
Kamat, P.1
Xu, W.2
Trappe, W.3
Zhang, Y.4
-
39
-
-
73349103422
-
Temporal privacy in wireless sensor networks: Theory and practice
-
Kamat, P., Xu, W., Trappe, W., Zhang, Y., Temporal privacy in wireless sensor networks: Theory and practice. ACM Trans. Sensor Netw. 5:4 (2009), 28:1–28:24, 10.1145/1614379.1614380.
-
(2009)
ACM Trans. Sensor Netw.
, vol.5
, Issue.4
, pp. 281-28:24
-
-
Kamat, P.1
Xu, W.2
Trappe, W.3
Zhang, Y.4
-
40
-
-
84936941264
-
A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems
-
Yang, X., Ren, X., Yang, S., McCann, J., A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems. Comput. Netw. 88 (2015), 72–88, 10.1016/j.comnet.2015.06.007.
-
(2015)
Comput. Netw.
, vol.88
, pp. 72-88
-
-
Yang, X.1
Ren, X.2
Yang, S.3
McCann, J.4
-
41
-
-
84900637145
-
A survey of intrusion detection in wireless network applications
-
Mitchell, R., Chen, I.-R., A survey of intrusion detection in wireless network applications. Comput. Commun. 42:0 (2014), 1–23, 10.1016/j.comcom.2014.01.012.
-
(2014)
Comput. Commun.
, vol.42
, pp. 1-23
-
-
Mitchell, R.1
Chen, I.-R.2
-
42
-
-
13244293318
-
IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements
-
Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)
-
The Institute of Electrical and Electronics Engineers (IEEE), IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), http://standards.ieee.org/getieee802/download/802.15.4-2006.pdf (2006).
-
(2006)
-
-
The Institute of Electrical and Electronics Engineers (IEEE)1
-
43
-
-
52249120873
-
Efficient anonymity schemes for clustered wireless sensor networks
-
Misra, S., Xue, G., Efficient anonymity schemes for clustered wireless sensor networks. Int. J. Sensor Netw. 1:1 (2006), 50–63, 10.1504/IJSNET.2006.010834.
-
(2006)
Int. J. Sensor Netw.
, vol.1
, Issue.1
, pp. 50-63
-
-
Misra, S.1
Xue, G.2
-
44
-
-
55649095270
-
Location privacy and anonymity preserving routing for wireless sensor networks
-
Nezhad, A.A., Miri, A., Makrakis, D., Location privacy and anonymity preserving routing for wireless sensor networks. Comput. Netw. 52:18 (2008), 3433–3452, 10.1016/j.comnet.2008.09.005.
-
(2008)
Comput. Netw.
, vol.52
, Issue.18
, pp. 3433-3452
-
-
Nezhad, A.A.1
Miri, A.2
Makrakis, D.3
-
45
-
-
52249090009
-
Providing anonymity in wireless sensor networks
-
Y. Ouyang, Z. Le, Y. Xu, N. Triandopoulos, S. Zhang, J. Ford, F. Makedon, Providing anonymity in wireless sensor networks, in: IEEE International Conference on Pervasive Services, 2007, pp. 145–148. http://dx.doi.org/10.1109/PERSER.2007.4283904.
-
(2007)
IEEE International Conference on Pervasive Services
, pp. 145-148
-
-
Ouyang, Y.1
Le, Z.2
Xu, Y.3
Triandopoulos, N.4
Zhang, S.5
Ford, J.6
Makedon, F.7
-
46
-
-
79953894894
-
An anonymous path routing (APR) protocol for wireless sensor networks
-
URL
-
Jiang, J.-R., Sheu, J.-P., Tu, C., Wu, J.-W., An anonymous path routing (APR) protocol for wireless sensor networks. J. Inf. Sci. Eng. 27:2 (2011), 657–680 URL http://www.iis.sinica.edu.tw/page/jise/2011/201103_16.html.
-
(2011)
J. Inf. Sci. Eng.
, vol.27
, Issue.2
, pp. 657-680
-
-
Jiang, J.-R.1
Sheu, J.-P.2
Tu, C.3
Wu, J.-W.4
-
47
-
-
84866061327
-
An efficient anonymous communication protocol for wireless sensor networks
-
Chen, J., Du, X., Fang, B., An efficient anonymous communication protocol for wireless sensor networks. Wirel. Commun. Mob. Comput. 12:14 (2012), 1302–1312, 10.1002/wcm.1205.
-
(2012)
Wirel. Commun. Mob. Comput.
, vol.12
, Issue.14
, pp. 1302-1312
-
-
Chen, J.1
Du, X.2
Fang, B.3
-
48
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A., RFID security and privacy: A research survey. IEEE J. Sel. Areas Commun. 24:2 (2006), 381–394, 10.1109/JSAC.2005.861395.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
49
-
-
27944449345
-
Enhancing source-location privacy in sensor network routing
-
ICDCS 2005
-
P. Kamat, Y. Zhang, W. Trappe, C. Ozturk, Enhancing source-location privacy in sensor network routing, in: 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, 2005, pp. 599–608. http://dx.doi.org/10.1109/ICDCS.2005.31.
-
(2005)
25th IEEE International Conference on Distributed Computing Systems
, pp. 599-608
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
50
-
-
67349099926
-
Privacy-aware routing in sensor networks
-
Wang, H., Sheng, B., Li, Q., Privacy-aware routing in sensor networks. Comput. Netw. 53:9 (2009), 1512–1529, 10.1016/j.comnet.2009.02.002.
-
(2009)
Comput. Netw.
, vol.53
, Issue.9
, pp. 1512-1529
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
51
-
-
32644437991
-
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
-
Deng, J., Han, R., Mishra, S., Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mob. Comput. 2:2 (2006), 159–186, 10.1016/j.pmcj.2005.12.003.
-
(2006)
Pervasive Mob. Comput.
, vol.2
, Issue.2
, pp. 159-186
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
52
-
-
55149095912
-
A novel scheme for protecting receiver's location privacy in wireless sensor networks
-
Jian, Y., Chen, S., Zhang, Z., Zhang, L., A novel scheme for protecting receiver's location privacy in wireless sensor networks. IEEE Trans. Wireless Commun. 7:10 (2008), 3769–3779, 10.1109/T-WC.2008.070182.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.10
, pp. 3769-3779
-
-
Jian, Y.1
Chen, S.2
Zhang, Z.3
Zhang, L.4
-
53
-
-
79958205953
-
On the use of fake sources for source location privacy: Trade-offs between energy and privacy
-
Jhumka, A., Leeke, M., Shrestha, S., On the use of fake sources for source location privacy: Trade-offs between energy and privacy. Comput. J. 54:6 (2011), 860–874, 10.1093/comjnl/bxr010.
-
(2011)
Comput. J.
, vol.54
, Issue.6
, pp. 860-874
-
-
Jhumka, A.1
Leeke, M.2
Shrestha, S.3
-
54
-
-
84883449680
-
Protecting the sink location privacy in wireless sensor networks
-
Yao, L., Kang, L., Shang, P., Wu, G., Protecting the sink location privacy in wireless sensor networks. Pers. Ubiquitous Comput., 2012, 1–11, 10.1007/s00779-012-0539-9.
-
(2012)
Pers. Ubiquitous Comput.
, pp. 1-11
-
-
Yao, L.1
Kang, L.2
Shang, P.3
Wu, G.4
-
55
-
-
70449584521
-
Cross-layer enhanced source location privacy in sensor networks
-
IEEE Communications Society (SECON’09)
-
Shao, M., Hu, W., Zhu, S., Cao, G., Krishnamurthy, S., La Porta, T., Cross-layer enhanced source location privacy in sensor networks. IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, 2009, IEEE Communications Society, (SECON’09), 1–9, 10.1109/SAHCN.2009.5168923.
-
(2009)
IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks
, pp. 1-9
-
-
Shao, M.1
Hu, W.2
Zhu, S.3
Cao, G.4
Krishnamurthy, S.5
La Porta, T.6
-
56
-
-
80053515818
-
Exploiting context-awareness to enhance source-location privacy in wireless sensor networks
-
Rios, R., Lopez, J., Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. Comput. J. 54:10 (2011), 1603–1615, 10.1093/comjnl/BXR055.
-
(2011)
Comput. J.
, vol.54
, Issue.10
, pp. 1603-1615
-
-
Rios, R.1
Lopez, J.2
-
57
-
-
48349110568
-
Location privacy in sensor networks against a global eavesdropper
-
IEEE
-
Mehta, K., Liu, D., Wright, M., Location privacy in sensor networks against a global eavesdropper. IEEE International Conference on Network Protocols, (ICNP 2007), 2007, IEEE, 314–323, 10.1109/ICNP.2007.4375862.
-
(2007)
IEEE International Conference on Network Protocols, (ICNP 2007)
, pp. 314-323
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
58
-
-
51349086896
-
Towards statistically strong source anonymity for sensor networks
-
M. Shao, Y. Yang, S. Zhu, G. Cao, Towards statistically strong source anonymity for sensor networks, in: The 27th Conference on Computer Communications IEEE INFOCOM 2008, 2008, pp. 466–474. http://dx.doi.org/10.1109/INFOCOM.2008.19.
-
(2008)
The 27th Conference on Computer Communications IEEE INFOCOM
, pp. 466-474
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
59
-
-
84871814015
-
Towards a statistical framework for source anonymity in sensor networks
-
Alomair, B., Clark, A., Cuellar, J., Poovendran, R., Towards a statistical framework for source anonymity in sensor networks. IEEE Trans. Mob. Comput. 12:2 (2012), 248–260, 10.1109/TMC.2011.267.
-
(2012)
IEEE Trans. Mob. Comput.
, vol.12
, Issue.2
, pp. 248-260
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
60
-
-
56749163645
-
Towards event source unobservability with minimum network traffic in sensor networks
-
ACM
-
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G., Towards event source unobservability with minimum network traffic in sensor networks. ACM Conference on Wireless Network Security, (WiSec’08), 2008, ACM, 77–88, 10.1145/1352533.1352547.
-
(2008)
ACM Conference on Wireless Network Security, (WiSec’08)
, pp. 77-88
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
61
-
-
84555189295
-
Protecting location privacy in sensor networks against a global eavesdropper
-
Mehta, K., Liu, D., Wright, M., Protecting location privacy in sensor networks against a global eavesdropper. IEEE Trans. Mob. Comput. 11:2 (2012), 320–336, 10.1109/TMC.2011.32.
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, Issue.2
, pp. 320-336
-
-
Mehta, K.1
Liu, D.2
Wright, M.3
-
62
-
-
67649494461
-
pDCS: Security and privacy support for data-centric sensor networks
-
Shao, M., Zhu, S., Zhang, W., Cao, G., Yang, Y., pDCS: Security and privacy support for data-centric sensor networks. IEEE Trans. Mob. Comput. 8:8 (2009), 1023–1038, 10.1109/TMC.2008.168.
-
(2009)
IEEE Trans. Mob. Comput.
, vol.8
, Issue.8
, pp. 1023-1038
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
Yang, Y.5
-
63
-
-
84938212949
-
Probabilistic receiver-location privacy protection in wireless sensor networks
-
Rios, R., Cuellar, J., Lopez, J., Probabilistic receiver-location privacy protection in wireless sensor networks. Inform. Sci. 321 (2015), 205–223, 10.1016/j.ins.2015.01.016.
-
(2015)
Inform. Sci.
, vol.321
, pp. 205-223
-
-
Rios, R.1
Cuellar, J.2
Lopez, J.3
-
64
-
-
84927583178
-
Location privacy in WSNs: Solutions, challenges, and future trends
-
Springer
-
Rios, R., Lopez, J., Cuellar, J., Location privacy in WSNs: Solutions, challenges, and future trends. Foundations of Security Analysis and Design (FOSAD) VII, Vol. 8604, 2014, Springer, 244–282, 10.1007/978-3-319-10082-1_9.
-
(2014)
Foundations of Security Analysis and Design (FOSAD) VII, Vol. 8604
, pp. 244-282
-
-
Rios, R.1
Lopez, J.2
Cuellar, J.3
-
65
-
-
84883331959
-
Cognitive radio wireless sensor networks: applications, challenges and research trends
-
Joshi, G.P., Nam, S.Y., Kim, S.W., Cognitive radio wireless sensor networks: applications, challenges and research trends. Sensors 13:9 (2013), 11196–11228, 10.3390/s130911196.
-
(2013)
Sensors
, vol.13
, Issue.9
, pp. 11196-11228
-
-
Joshi, G.P.1
Nam, S.Y.2
Kim, S.W.3
-
66
-
-
51249098943
-
A new replay attack against anonymous communication networks
-
ICC’08, pp.
-
R. Pries, W. Yu, X. Fu, W. Zhao, A new replay attack against anonymous communication networks, in: IEEE International Conference on Communications, ICC’08, 2008, pp. 1578–1582. http://dx.doi.org/10.1109/ICC.2008.305.
-
(2008)
IEEE International Conference on Communications
, pp. 1578-1582
-
-
Pries, R.1
Yu, W.2
Fu, X.3
Zhao, W.4
-
67
-
-
85076290610
-
A practical congestion attack on tor using long paths
-
USENIX Association Berkeley, CA, USA URL
-
Evans, N.S., Dingledine, R., Grothoff, C., A practical congestion attack on tor using long paths. Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09, 2009, USENIX Association, Berkeley, CA, USA, 33–50 URL http://dl.acm.org/citation.cfm?id=1855768.1855771.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium, SSYM’09
, pp. 33-50
-
-
Evans, N.S.1
Dingledine, R.2
Grothoff, C.3
-
68
-
-
85019869360
-
-
Wearables for your brain, (Accessed 02/2017)
-
Emotiv, Inc., Wearables for your brain, https://www.emotiv.com/ (Accessed 02/2017) (2014).
-
(2014)
-
-
Emotiv, Inc.,1
|