1 |
Li Na , Zhang Nan , Das Sajal K , et al. Privacy preservation in wireless sensor networks:a state-of-the-art survey. Ad Hoc Networks, 2009,7(8):1501~1514
|
2 |
Celal O , Zhang Yanyong , Wade T . Source-location privacy in energy-constrained sensor network routing. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington,DC,USA, 2004:88~93
|
3 |
Kamat P , Zhang Y , Trappe W , et al. Enhancing source-location privacy in sensor network routing. Proceedings of 25th IEEE International Conference on Distributed Computing Systems, Columbus,OH,USA, 2005:599~608
|
4 |
Yao Jianbo , Wen Guangjun . Preserving source-location privacy in energy-constrained wireless sensor networks. Proceedings of the 28th International Conference on Distributed Computing Systems Workshops,(ICDCS Workshops), Beijing,China, 2008:412~416
|
5 |
陈娟, 方滨兴, 殷丽华 等 传感器网络中基于源节点有限洪泛的源位置隐私保护协议. 计算机学报, 2010,33(9):1736~1746
|
6 |
Ren Jian , Li Yun , Li Tongtong . Routing-based source-location privacy in wireless sensor networks. Proceedings of 2009 IEEE International Conference on Communications, Dresden,Germany, 2009
|
7 |
Pietro R D , Alexandre V . Location privacy and resilience in wireless sensor networks querying. Computer Communications, 2011,34(3)
|
8 |
钱萍, 吴蒙 . 同态加密隐私保护数据挖掘方法综述. 计算机应用研究, 2011,28(5):1614~1617
|
9 |
Rivest R L , Adleman L , Detrouzos M L . On data banks and privacy homomorphism. Foundations of Secure Computation, 1978:169~179
|
10 |
Westhoff D , Girao J , Acharya M . Concealed data aggregation for reverse multicast traffic in sensor networks:encryption,key distribution,and routing adaptations. IEEE Transactions on Mobile Computing, 2006,5(10):1417~1431
|
11 |
He W , Liu X , Nguyen H , et al. PDA:privacy-preserving data aggregation in wireless sensor networks. Proceedings of 26th IEEE International Conference on Computer Communications (Infocom 2007), Anchorage,Alaska,USA, 2007:2045~2053
|
12 |
Koblitz N . Elliptic curve cryptosystems. Mathematics of Computation, 1987(48):203~309
|
13 |
Miller V S . Use of elliptic curves in cryptography. Proceedings of CRYPTO 1985, California,USA, 1985:417~426
|