Computer Science ›› 2013, Vol. 40 ›› Issue (11): 197-202.
Previous Articles Next Articles
SHI Lu-sheng and QIN Xiao-lin
[1] He W,Nguyen H,Liu X,et al.iPDA:Anintegrity-protectingprivate data aggregation scheme for wireless sensor networcks[C]∥Proceedings of the Military Communications Conference.SanDiego,CA,USA,2008:1-7 [2] Madden S,Franklin M J,Hellerstein J M.TAG:A Tiny Aggregation Service for Ad hoc Sensor Networks[C]∥Proceedings of the 5th Symposium on Operating Systems Design and Implementation.NewYork,USA,2002:131-146 [3] Deshpande A,Nath S,Gibbons P B,et al.Cache-and-query for wide area sensor databases [C]∥Proceedings of the 2003ACM SIGMOD International Conference on Management of Data.SanDiego,CA,USA,2003:503-514 [4] Tang X,Xu J.Extending network lifetime forprecision con-strained data aggregation in wireless sensor networks[C]∥Proceedings of the IEEE INFOCOM.Barcelona,Catalunya,Spain,2006:755-766 [5] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,5(6):1131-1146 [6] He W,Liu X,Nguyen H,et al.PDA:Privacy-preserving dataaggregation in wireless sensor networks[C]∥Proceedings of the 26th IEEE International Conference on Computer Communications(INFOCOM).Anchorage,USA,2007:2045-2053 [7] Yao Jian-bo,Wen Guang-jum.Protecting classification priracydata aggregation in wireless sensor networks[C]∥Proceedings of the 4th International Conference on Wireless Communication.Networking and Mobile Computing(WiCOM).Dalian,China,2008:1-5 [8] 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800 [9] Joao G,Dirk W,Markns S.CDA:Concealed data aggregation for reverse muhicastt raffic in wireleass sensor networks[C]∥Proceedings of the IEEE International Conference on Communications(ICC).Seoul,Korea,2005:3044-3049 [10] Castelluceia C,Mykletun E,Tsudik G.Efficient aggregation ofencrypted data in wireless sensor networks[C]∥Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems:Computing,Networking and Services(MobiQuitoue).SanDiego,CA,USA,2005:109-117 [11] Feng Tai-ming,Wang Chnang,Zhang Wen-shang,et al.Confi-dentiality protection for distributed sensor data aggregation[C]∥Proceedings of the 27th IEEE International Conference on Computer Communications(INFOCOM).Phoenix,USA,2008:56-60 [12] Ozdemir S,Yang Xiao.Integrity protecting hierarchical con-cealed data aggregation for wireless sensor networks[J].Computer Networks,2011,55(8):1735-1746 [13] Papadopoulos S,Kiayias A,Papadias D.Secure and efficient in-network processing of exact SUM queries[C]∥Proceedings of the 27th International Conference on Data Engineering(ICDE).Hannover,Germany,2011:517-528 [14] Zhang W S,Wang C,Feng T M.GP2S:Generic privacy-preserving solutions for approximate aggregation of sensor data[C]∥Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications(PerCom).Hong Kong,China,2008:179-184 [15] Groat M M,He W B,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥Proceedings of the 30th IEEE International Conference on Computer Communications(INFOCOM).Shanghai,China,2011:2024-2032 [16] Przydatek B,Song D,Perrig A.SIA:Secure information aggregation in sensor networks[C]∥Proc.of the 1st Int’l Conf.on Embedded Networked Sensor Systems.New York:ACM Press,2003:255-265 [17] Yang Yi,Wang Xin-ran,Zhu Sen-cun,et al.SDAP:A SecureHop-by-Hop Data Aggregation Protocol for Sensor Networks[C]∥ACM Int.l Symp on Mobile Ad Hoc Networking and Computing(MOBIHOC 2006).Florence,Italy,2006:356-367 [18] He W,Liu X,Nguyen H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]∥Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops.Montreal,QC,Canada,2009:14-19 |
No related articles found! |
|