Computer Science ›› 2013, Vol. 40 ›› Issue (7): 84-88.
Previous Articles Next Articles
CHEN Wei,YANG Long and YU Le
[1] Madden S,Franklin M J,Hellerstein J M.TAG:A tiny aggregation service for ad hoc sensor networks[C]∥Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York,USA,2002:131-146 [2] He Wenbo,Hoang Nguyen,Liu Xue,et al.Pda:Privacy-preserving data aggregation in wireless sensor networks[C]∥Procee-dings of 26th IEEE International Conference on Computer Communications(INFOCOMM).2007:2045-2053 [3] He Wenbo,Hoang Nguyen,Liu Xue,et al.iPDA:An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks[C]∥Proceedings of IEEE Military Communications Conference.2008:1-7 [4] Feng T,Wang C,Zhang W,et al.Confidentiality protection for distributed sensor data aggregation[C]∥Proceedings of 27th IEEE International Conference on Computer Communications(INFOCOMM).Phoenix,AZ,USA,2008:56-60 [5] Wang Chuang,Wang Gui-ling,Zhang Wen-sheng,et al.Reconciling Privacy Preservation and Intrusion Detection in Sensory Data Aggregation[C]∥Proceedings of 27th IEEE International Conference on Computer Communications(INFOCOMM).2011:336-340 [6] Przydatek B,Perrig A,Song D.SIA:secure information aggregation in sensor networks[C]∥Proceedings of the 1st international conference on Embedded networked sensor systems.New York,USA,2003:255-265 [7] Yang Y,Wang X,Zhu S,et al.SDAP:a secure hop-by-hop data aggregation protocol for sensor networks[J].ACM Transactions on Information and System Security,2008,11(4) [8] Ozdemir S,am H.Integration of False Data Detection WithData Aggregation and Confidential Transmission in Wireless Sensor Networks[J].IEEE/ACM T ransactions on Networking,2010,18(3):736-749 [9] Blundo C,Santis A,Herzberg A,et al.Perfectly-secure key distribution for dynamic conferences[J].Proceedings of Crypto,1992,740:471-486 [10] Du W,Deng J,Han Y S,et al.A pairwise key pre-distribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258 [11] Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77 [12] Karlof C,Sastry N,Wagner D.TinySec:A link layer security architecture for wireless sensor networks[C]∥Proceedings of the 2nd international conference on Embedded networked sensor systems.New York,USA,2004:162-175 [13] Zhang W,Wang C,Feng T.Gp2s:Generic privacy-preservation solutions for approximate aggregation of sensor data[C]∥Proceedings of IEEE PerCom.2008:179-184 [14] 陈娟,张宏莉.无线传感器网络安全研究综述[J].哈尔滨工业大学学报,2011,43(7):90-95 [15] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146 [16] 姚剑波,文光俊.无线传感器网络中的隐私保护研究[J].计算机科学,2008,35(11):19-22 [17] 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800 [18] 张鹏,喻建平,刘宏伟.传感器网络安全数据融合[J].计算机科学,2011,38(8):106-108 |
No related articles found! |
|