1 |
Li N , Zhang N , Das Sajal K , et al. Privacy preservation in wireless sensor networks: a state-of-the-art survey. Ad Hoc Networks, 2009,7(8): 1501~1514
|
2 |
Celal O , Zhang Y Y , Wade T . Source-location privacy in energy-constrained sensor network routing. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA, 2009: 88~93
|
3 |
Kamat P , Zhang Y , Trappe W , et al. Enhancing source-location privacy in sensor network routing. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, Columbus, OH,USA, 2005: 599~608.
|
4 |
Yao J B , Wen G J . Preserving source-location privacy in energy-constrained wireless sensor networks. Proceedings of the 28th International Conference on Distributed Computing Systems Workshops,(ICDCS Workshops), Beijing, China, 2008: 412~416
|
5 |
陈娟, 方滨兴, 殷丽华 等. 传感器网络中基于源节点有限洪泛的源位置隐私保护协议. 计算机学报 , 2010,33(9): 1736~1746
|
6 |
Ren J , Li Y , Li T T . Routing-based source-location privacy in wireless sensor networks. Proceedings of 2009 IEEE International ConferenceonCommunications, Dresden,Germany, 2009
|
7 |
Pietro Pietro , Alexandre V . Location privacy and resilience in wireless sensor networks querying. Computer Communications, 2011,34(3)
|
8 |
钱萍, 吴蒙 . 同态加密隐私保护数据挖掘方法综述. 计算机应用研究, 2011,28(5): 1614~1617
|
9 |
Rivest R L , Adleman L , Detrouzos M L . On data banks and privacy homomorphism. Foundations of Secure Computation, 1978: 169~179
|
10 |
Westhoff D , Girao J , Acharya M . Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptations. IEEE Transactions on Mobile Computing, 2006,5(10): 1417~1431
|
11 |
He W , Liu X , Nguyen H , et al. PDA: privacy-preserving data aggregation in wireless sensor networks. Proceedings of 26th IEEE International Conference on Computer Communications (Infocom 2007), Anchorage, Alaska, USA, 2007: 2045~2053
|
12 |
Koblitz N . Elliptic curve cryptosystems.Mathematics of Computationy, 1987(48): 203-309
|
13 |
Miller V S . Use of elliptic curves in cryptography. Proceedings of CRYPTO 1985, California, USA, 1985: 417-426
|