Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 393-397.doi: 10.11896/j.issn.1002-137X.2016.11A.090
Previous Articles Next Articles
LIU Huai-jin, CHEN Yong-hong, TIAN Hui, WANG Tian and CAI Yi-qiao
[1] Gnawali O,Jang K Y,Paek J,et al.The tenet architecture for tiered sensor networks[C]∥Proceedings of the 4th International Conference on Embedded Networked Sensor Systems.ACM,2006:153-166 [2] Ratnasamy S,Karp B,Shenker S,et al.Data-centric storage insensornets with GHT,a geographic hash table[J].Mobile Networks and Applications,2003,8(4):427-442 [3] Sheng B,Li Q.Verifiable privacy-preserving range query in two-tiered sensor networks[C]∥The 27th Conference on Computer Communications(INFOCOM 2008).IEEE,2008 [4] Chen F,Liu A X.SafeQ:Secure and efficient query processing in sensor networks[C]∥2010 Proceedings IEEE INFOCOM.IEEE,2010:1-9 [5] Chen F,Liu A X.Privacy-and integrity-preserving range queriesin sensor networks[J].IEEE/ACM Transactions on Networking,2012,20(6):1774-1787 [6] 戴华,杨庚,肖甫,等.两层传感网中能量高效的隐私保护范围查询方法[J].计算机研究与发展,2015,52(4):983-993 [7] 窦轶,黄海平,王汝传,等.两层无线传感器网络安全范围查询协议[J].计算机研究与发展,2013,50(6):1253-1266 [8] 周强,杨庚,李森,等.一种可检测数据完整性的隐私数据融合算法[J].电子与信息学报,2013,35(6):1277-1283 [9] Groat M M,He W,Forrest S.KIPDA:k-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥2011 Proceedings IEEE INFOCOM.IEEE,2011:2024-2032 [10] Rivest R.RFC1321,The MD5 message-digest algorithm request for comments[S].Cambridge:MIT and RSA Data Security,1992 [11] Rappaport T S.Wireless communications:principles and practice[M].New Jersey:Prentice Hall PTR,1996 [12] 武佩宁.两层无线传感器网络中安全数据查询协议的研究[D].南宁:广西大学,2014 [13] Coman A,Nascimento M A,Sander J.A framework for spatio-temporal query processing over wireless sensor networks[C]∥Proceeedings of the 1st International Workshop on Data Mana-gement for Sensor Networks:in Conjunction with VLDB 2004.ACM,2004:104-110 |
No related articles found! |
|