[1]
范永健,陈红,张晓莹. 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012,35(6):11311146.
[2] 张晓玲,梁炜,于海斌,等. 无线传感器网络传输调度方法综述[J]. 通信学报, 2012,33(5):143157.
[3] Agrawal R, Sriknat R. Privacypreserving data mining[C]// Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). 2000:439450.
[4] Huang Zhangli, Du Wenliang, Chen Biao. Deriving private information from randomized data[C]// Proceedings of the ACM SIGMOD International Conferences on Management of Data (SIGMOD). 2005:3748.
[5] Sweeney L. Achieving kanonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainly, Fuzziness and Knowledgebased Systems, 2002,10(5):571588.
[6] Li N, Li T. Tcloseness: Privacy beyond kanonymity and ldiversity[C]// Proceedings of the 23rd International Conference on Data Engineering (ICDE). 2007:106115.
[7] Clifton C, Kantarcioglou M, Lin X, et al. Tools for PrivacyPreserving distributed data mining[J]. ACM SIGMOD Explorations, 2002,4(2):2834.
[8] Malin B, Airoldi E, EdohoEket S, et al. Configurable security protocols for multiparty data analysis with malicious participants[C]// Proceedings of the 21st International Conference on Data Engineering (ICDE). 2005:533544.
[9] Claude Castelluccia. Authenticated Interleaved Encryption[R]. Cryptology Print Archive, Report 2006/416, 2006.
[10]Claude Castelluccia. Securing very dynamic groups and data aggregation in wireless sensor networks[C]// IEEE International Conference on Mobile Adhoc and Sensor Systems. 2007,8:19.
[11] Claude Castelluccia, Einar Mykletun, Gene Tsudik. Efficient aggregation of encryption data in wireless sensor networks[C]// IEEE International Conference on Mobile and Ubiquitous Systems: Networking and Services. 2005:109117.
[12]Kaskaloglu K, Selcuk A A. Threshold broadcast encryption with reduced complexity[C]// IEEE the 22nd International Symposium on Computer and Information Sciences. 2007:14.
[13]Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata. Stateful Identitybased encryption scheme: Faster encryption and decryption[C]// Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. 2008:381388.
[14]Alexandra Boldyreva,Vipul Goyal, Virendra Kumar. Identitybased encryption with efficient revocation[C]// Proceedings of the 15th ACM Conference on Computer and Communications Security(CCS'08). 2008:417426.
[15]付杰,卢建朱,郑旋. 一种改进的高效无线传感器交叉加密方案[J]. 计算机工程与应用, 2010,46(18):119121. |