Computer Science ›› 2017, Vol. 44 ›› Issue (5): 6-13.doi: 10.11896/j.issn.1002-137X.2017.05.002
Previous Articles Next Articles
DAI Hua, YE Qing-qun, YANG Geng, XIAO Fu and HE Rui-liang
[1] GNAWALI O,JANG K Y,PAEK J,et al.The tenet architecture for tiered sensor networks[C]∥Proc of the ACM Conf on Embedded Networked Sensor Systems.New York:ACM,2006:153-166. [2] YAO Y L,LIU J F,XIONG N N.Privacy-Preserving Data Aggregation in Two-Tiered Wireless Sensor Networks with Mobile Nodes [J].Sensors,2014,14(11):21174-21194. [3] GOLDREICH O.Foundations of Cryptography:Volume 2,Basic Applications [M].New York,NY,USA:Cambridge University Press,2004. [4] BOZOIC V,SOCEK D,STEINWANDT R,et al.Multi-authorityattribute-based eneryption with honest-but-curious central authority[J].International Journal of Computer Mathematics,2012,89(3):268-283. [5] AGRAWAL R,KIERNAN J,SRIKANT R,et al.Order preserving encryption for numeric data [C]∥Proc of the 2004 ACM SIGMOD International Conference on Management of Data.ACM,2004:563-574. [6] ZHANG R,SHI J,LIU Y Z,et al.Verifiable fine-grained top-k queries in tiered sensor networks[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9. [7] FAN Y J,CHEN H.Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks[J].Chinese Journal of Computers,2012,35(3):423-433.(in Chinese) 范永健,陈红.两层传感器网络可验证Top-k查询处理协议[J].计算机学报,2012,35(3):423-433. [8] LIAO X J,LI J Z.Privacy-preserving and secure top-k query in two-tier wireless sensor network [C]∥Proc of Global Communications Conference.CA,USA,IEEE,2012:335-341. [9] YAO Y L,LI M,LIU J F.Privacy-preserving Top-K Query in Two-tiered Wireless Sensor Networks [J].International Journal of Advancements in Computing Technology,2012,4(6):226-235. [10] LI R,LIN Y P,YI Y Q,et al.A Secure Top-k query protocol in two-tiered sensor networks [J].Journal of Computer Research and Development,2012,49(9):1947-1958.(in Chinese) 李睿,林亚平,易叶青,等.两层传感网络中的安全Top-k查询协议[J].计算机研究与发展,2012,49(9):1947-1958. [11] ZHOU T,LIN Y P,ZHANG W,et al.Secure and VerifiableTop-K Query in Two-Tiered Sensor Networks [M]∥Security and Privacy in Communication Networks.Springer International Publishing,2013:19-34. [12] DAI H,YANG G,QIN X L,et al.Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks [J].Journal of Computer Research and Development,2015,50(6):1239-1252.(in Chinese) 戴华,杨庚,秦小麟,等.面向隐私保护的两层传感网 Top-k 查询处理方法[J].计算机研究与发展,2015,50(6):1239-1252. [13] MA X,SONG H,WANG J,et al.A novel verification scheme for fine-grained Top-k queries in two-tiered sensor networks [J].Wireless Personal Communications,2014,75(3):1809-1826. [14] DAI H,YANG G,HUANG H P,et al.EVTQ:An EfficientVerifiable Top-k Query Processing in Two-tiered Wireless Sensor Networks [C]∥Proc of 9th IEEE International Conference on Mobile Ad-hoc and Sensor Networks.2013:206-211. [15] DAI H,YANG G,HUANG H P,et al.Efficient verifiable top-k queries in two-tiered wireless sensor networks [J].KSII Tran-sactions on Internet and Information Systems,2015,9(6):2111-2131. [16] YU C M,NI G K,CHEN Y,et al.Top-k query result completeness verification in sensor networks[C]∥Proc of 2013 IEEE International Conference on Communications Workshops.IEEE,2013:1026-1030. [17] YU C M,NI G K,CHEN Y,et al.Top-Query Result Completeness Verification in Tiered Sensor Networks [J].IEEE Transactions on Information Forensics and Security,2014,9(1):109-124. [18] PENG H,ZHANG X,CHEN H,et al.Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor Networks [C]∥ Proc of 2015 IEEE Trustcom/BigDataSE/ISPA.IEEE,2015:555-562. [19] CHENG J,YANG H,WONG S H Y,et al.Design and implementation of cross-domain cooperative firewall [C]∥Proc of 2007 IEEE International Conference on Network Protocols.IEEE,2007:284-293. [20] LIU A X,CHEN F.Collaborative enforcement of firewall policies in virtual private networks [C]∥Proc of the Twenty-seventhACM Symposium on Principles of Distributed Computing.ACM,2008:95-104. [21] KRAWCYK H,CANETTI R,BELLARE M.HMAC:Keyed-hashing for message authentication,RFC 2104 [R].Reston:Internet Society,1997. [22] BLOOM B H.Space/time trade-offs in hash coding with allowable errors [J].Communications of the ACM,1970,13(7):422-426. [23] VAIDYA J,CLIFTON C W.Privacy-preserving kth elementscore over vertically partitioned data [J].IEEE Transactions on Knowledge and Data Engineering,2009,21(2):253-258. [24] WU M,XU J,TANG X,et al.Top-k monitoring in wireless sensor networks [J].IEEE Transactions on Knowledge and Data Engineering,2007,19(7):962-976. [25] MALHOTRA B,NASIMENTO M,NIKOLAIDIS I.Exact top-kqueries in wireless sensor networks [J].IEEE Transactions on Knowledge and Data Engineering,2011,23(10):1513-1525. [26] JIANG H,JIN S,WANG C.Parameter-based data aggregationfor statistical information extraction in wireless sensor networks [J].IEEE Transactions on Vehicular Technology,2010,59(8):3992-4001. [27] LI F,YI K,JESTES J.Ranking distributed probabilistic data[C]∥Proc of the 2009 ACM SIGMOD International Conference on Management of Data.ACM,2009:361-374. [28] FENG J,POTKONJAK M.Real-time watermarking techniques for sensor networks [C]∥Proc of SPIE Security and Watermarking of Multimedia Contents.Bellingham,WA:SPIE Press,2003:391-402. [29] ZHANG W,IU Y,DAS S K,et al.Secure data aggregation in wireless sensor networks.A watermark based authentication supportive approach [J].Pervasive and Mobile Computing,2008,4(5):658-680. [30] YI Y Q,LIN Y P,LI X L,et al.False data filtering algorithmusing cooperation watermarks for WSN [J].Journal of Software,2010,21(1):107-118.(in Chinese) 易叶青,林亚平,李小龙,等.WSN中基于协作水印的虚假数据过滤算法[J].软件学报,2010,1(1):107-118. [31] YI Y Q,LIN Y P,PENG G,et al.False data filtering algorithm without relying on MAC authentication for wirelesss sensor networks [J].Journal of Communication,2009,20(6):53-63.(in Chinese) 易叶青,林亚平,彭舸,等.无线传感器网络中不依赖MAC认证的虚假数据过滤算法[J].通信学报,2009,20(6):53-63. [32] BOLDYREVA A,CHENETTE N,O’NEILL A.Order-preserving encryption revisited:Improved security analysis and alternative solutions [M].Advances in Cryptology-CRYPTO 2011.Springer Berlin Heidelberg,2011:578-595. [33] YI Y,LI R,CHEN F,et al.A digital watermarking approach to secure and precise range query processing in sensor networks [C]∥Proc of 2013 IEEE International Conference on Computer Communication.IEEE,2013:1950-1958. [34] SHENG B,LI Q.Verifiable privacy-preserving range query in two-tiered sensor networks [C]∥Proc of 27th IEEE International Conference on Computer Communications.NJ:IEEE.2008:46-50. [35] SHI J,ZHANG R,ZHANG Y.Secure range queries in tieredsensor networks [C]∥Proc of the 28th IEEE International Conference on Computer Communication.Piscataway,NJ:IEEE,2009:945-953. [36] ZHANG R,SHI J,ZHANG Y.Secure multidimensional rangequeries in sensor networks [C]∥Proc of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing.ACM,2009:197-206. [37] CHEN F,LIU A X.SafeQ:Secure and efficient query processing in sensor networks [C]∥ Proc of the 28th IEEE International Conference on Computer Communication.Piscataway,NJ:IEEE,2010:1-9. [38] CHEN F,LIU A X.Privacy and integrity-preserving range queries in sensor networks [J].IEEE/ACM Transaction on Networks,2012,20(6):1774-1787. [39] TSOU Y T,LU C S,Kuo S Y.Privacy-and integrity-preserving range query in wireless sensor networks [C]∥Proc of Global Communications Conference,2012 IEEE.IEEE,2012:328-334. [40] ZHANG X,DONG L,PENG H,et al.Achieving efficient and secure range query in two-tiered wireless sensor networks [C]∥Proc of the 24nd IEEE International Symposium In Quality of Service (IWQoS).2014:380-388. [41] NGUYEN T D,BUI T V,DANG V H,et al.Efficiently preserving data privacy range queries in two-tiered wireless sensor networks [C]∥Proc of Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC).IEEE,2012:973-978. [42] ZHANG X,DONG L,PENG H,et al.Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks [J].Sensors,2014,14(12):23905-23932. [43] CHANG Y K.Fast binary and multiway prefix searches forpacket forwording[J].Computer Networks,2007,51(3):588-605. [44] YAO Y,XIONG N,et al.Privacy-preserving max/min query in two-tiered wireless sensor networks [J].Computers & Mathematics with Applications,2013,65(9):1318-1325. |
No related articles found! |
|