1 |
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K, "System Architecture Directions for Networked Sensors," ACM SIGPLAN Notices, Vol.35, Issue 11, pp. 93-104, 2000
DOI
|
2 |
Hu, L., Evans, D., "Secure Aggregation for Wireless Networks," Proc. of the 2003 Symposium on Applications and the Internet Workshops, pp. 384-391, 2003
|
3 |
Wagner, D., "Cryptanalysis on the Algebraic Privacy Homomorphism," Proc. of the 6th International Conference on Information Security (ISC 2003), LNCS VoI.2851, pp. 234-239, 2003
DOI
|
4 |
Castelluccia, C., Mykletun, E., Tsudik, G., "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitos 2005), pp. 109-117, 2005
|
5 |
Girao, J., Westhoff, D., Schneider, M., "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. of IEEE International Conference on Communications (ICC 2005), Vol.5, pp. 3044-3049, 2005
DOI
|
6 |
Mykletun, E., Girao, J., Westhoff, D., "Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks," Proc. of IEEE International Conference on Communications (ICC '06), Vol.5, pp. 2288-2295, 2006
|
7 |
Domingo-Ferrer, J, "A provably Secure Additive and Multiplicative Privacy Homomorphism," Proc. of the 5th International Conference on Information Security, LNCS Vol.2433, pp. 471-483, 2002
DOI
|
8 |
Peter, S., Langendorfer, P., Piotrowski, K, "Public Key Cryptography Empowered Smart Dust is Affordable," Int. Journal of Sensor Networks 2008, Vol.4, No. 1/2, pp. 130-143, 2008
DOI
ScienceOn
|
9 |
Piotrowski, K, Langendoerfer, P., Peter, S., "How public key cryptography influences wireless sensor node lifetime," Proc. of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 169-176, 2006
|
10 |
Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N., "Secure Data Aggregation in Wireless Sensor Networks: A survey," Proc. of the 7th Int. Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp. 315-320, 2006
|
11 |
Boneh, D., Gentry, C., Lynn, B., and Shacham, H., "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Proc. of EUROCRYPT '2003, LNSC VoI.2656, pp. 416-432, 2003
DOI
|
12 |
Peter, S., Piotrowski, K, Langendoerfer, P., "On Concealed Data Aggregation for Wireless Sensor Networks," Proc. of IEEE Consumer Communications and Networking Conference (IEEE CCNC 2007), pp. 192-196, 2007
|
13 |
Przydatek, B., Song, D., Perrig, A., "SIA: Secure Information Aggregation in Sensor Networks," Proc. of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255-265, 2003
|
14 |
Mykletun, E., Narasimha, M., and Tsudik, G., "Authentication and Integrity in Outsourced Databases," the 11th Annual Network and Distributed System Security Symposium, USA, 2006
|