Related references
Note: Only part of the references are listed.Privacy-Aware Collaborative Task Offloading in Fog Computing
Mian Muaz Razaq et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)
Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing
Zhuoran Ma et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
PF-BTS: A Privacy-Aware Fog-enhanced Blockchain-assisted task scheduling
Hamza Baniata et al.
INFORMATION PROCESSING & MANAGEMENT (2021)
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems
B. D. Deebak et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)
Lightweight, Divide-and-Conquer privacy-preserving data aggregation in fog computing
Kinza Sarwar et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids
Shuai Zhao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
A survey on data aggregation techniques in IoT sensor networks
Soroush Abbasian Dehkordi et al.
WIRELESS NETWORKS (2020)
An exhaustive survey on security and privacy issues in Healthcare 4.0
Jigna J. Hathaliya et al.
COMPUTER COMMUNICATIONS (2020)
An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City
Mehdi Gheisari et al.
COMPUTERS & ELECTRICAL ENGINEERING (2020)
An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy
Sachi Nandan Mohanty et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Designing privacy-aware internet of things applications
Charith Perera et al.
INFORMATION SCIENCES (2020)
Identifying spatio-temporal patterns of bus bunching in urban networks
Christina A. Iliopoulou et al.
JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS (2020)
Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices
Ke Gu et al.
SENSORS (2020)
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid
Jia-Nan Liu et al.
IEEE TRANSACTIONS ON SMART GRID (2020)
A two-way trust management system for fog computing
Esubalew Alemneh et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
A privacy-preserving data aggregation scheme for dynamic groups in fog computing
Xiaodong Shen et al.
INFORMATION SCIENCES (2020)
Temporal Differential Privacy in Wireless Sensor Networks
Bodhi Chakraborty et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
SDN based communications privacy-preserving architecture for VANETs using fog computing
Muhammad Arif et al.
VEHICULAR COMMUNICATIONS (2020)
Classification of optimization problems in fog computing
Julian Bellendorf et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme
Jie Cui et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)
Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing
Youyang Qu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
A robust authentication and access control protocol for securing wireless healthcare sensor networks
Zeeshan Ali et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
Efficient location privacy-preserving range query scheme for vehicle sensing systems
Peng Hu et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2020)
A privacy-preserving mechanism based on local differential privacy in edge computing
Mengnan Bi et al.
China Communications (2020)
Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT
Siguang Chen et al.
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2020)
A Privacy Preserving Model for Fog-enabled MCC systems using 5G Connection
Hamza Baniata. et al.
2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC) (2020)
Privacy-Preserving Federated Learning in Fog Computing
Chunyi Zhou et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies
Salma Abdalla Hamad et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
P-3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing
Ping Zhao et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2020)
Revamping data access privacy preservation method against inside attacks in wireless sensor networks
S. Sathees Babu et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Video denoising for security and privacy in fog computing
Hong Zhang et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)
A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices
Jingjing Gu et al.
SENSORS (2019)
Ontology-Defined Middleware for Internet of Things Architectures
Victor Caballero et al.
SENSORS (2019)
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
Lilian C. Mutalemwa et al.
SENSORS (2019)
Fog Computing Security Challenges and Future Directions
Deepak Puthal et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2019)
An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks
Xiao Chun Yin et al.
SENSORS (2019)
A novel privacy- and integrity-preserving approach for multidimensional data range queries in two-tiered wireless sensor networks
Lei Wang et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities
Z. Berkay Celik et al.
ACM COMPUTING SURVEYS (2019)
Additively homomorphic encryption and fragmentation scheme for data aggregation inside unattended wireless sensor networks
Katarzyna Kapusta et al.
ANNALS OF TELECOMMUNICATIONS (2019)
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
Zhitao Guan et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs
Mengmeng Xu et al.
2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019) (2019)
Privacy-Preserving and Dynamic Spatial Range Aggregation Query Processing in Wireless Sensor Networks
Lisong Wang et al.
DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (2019)
Privacy Ensured e-Healthcare for Fog-Enhanced IoT Based Applications
Rahul Saha et al.
IEEE ACCESS (2019)
Data provenance to audit compliance with privacy policy in the Internet of Things
Thomas Pasquier et al.
PERSONAL AND UBIQUITOUS COMPUTING (2018)
Security in Internet of Things: issues, challenges, taxonomy, and architecture
Vipindev Adat et al.
TELECOMMUNICATION SYSTEMS (2018)
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
Sana Belguith et al.
COMPUTER NETWORKS (2018)
Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks
Edwin Prem Kumar Gilbert et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
Sravani Challa et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
Georgios Karopoulos et al.
COMPUTERS & SECURITY (2018)
A resilient data aggregation method based on spatio-temporal correlation for wireless sensor networks
Yong Lu et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
Prosanta Gope et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Security and trust issues in Fog computing: A survey
PeiYun Zhang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A robust and anonymous patient monitoring system using wireless medical sensor networks
Ruhul Amin et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework
Vasileios A. Memos et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
Dongyoung Koo et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Secure intelligent traffic light control using fog computing
Jian Liu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Anonymous and secure aggregation scheme in fog-based public cloud computing
Huaqun Wang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Hybrid privacy-preserving clinical decision support system in fog-cloud computing
Ximeng Liu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems
Samet Tonyali et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Position based cryptography with location privacy: A step for Fog Computing
Rupeng Yang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Khalid Mahmood et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes
Ming Tao et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Secure integration of IoT and Cloud Computing
Christos Stergiou et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Privacy in the Smart City-Applications, Technologies, Challenges, and Solutions
David Eckhoff et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Hybrid online protocols for source location privacy in wireless sensor networks
Matthew Bradbury et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2018)
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
Hongyang Yan et al.
SENSORS (2018)
A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT
Pradip Kumar Sharma et al.
IEEE ACCESS (2018)
Cloud-Based Fine-Grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation
Lo-Yao Yeh et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)
Security and Privacy Challenges for Internet-of-Things and Fog Computing
Ximeng Liu et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)
Tracking job and housing dynamics with smartcard data
Jie Huang et al.
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2018)
Enforcing authorizations while protecting access confidentiality
Sabrina De Capitani di Vimercati et al.
JOURNAL OF COMPUTER SECURITY (2018)
A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance
Haiyong Bao et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
Prem Prakash Jayaraman et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Evolving privacy: From sensors to the Internet of Things
Javier Lopez et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Towards a secure service provisioning framework in a Smart city environment
Zaheer Khan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions
Jun Zhou et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
Prosanta Gope et al.
IEEE SENSORS JOURNAL (2017)
Anonymous Secure Framework in Connected Smart Home Environments
Pardeep Kumar et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids
Hua Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning
Tao Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status
Yuan Hong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Distributed Aggregate Privacy-Preserving Authentication in VANETs
Lei Zhang et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)
Preservation of temporal privacy in body sensor networks
Abolfazl Diyanat et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications
Wei Song et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2017)
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
Min Xiao et al.
SENSORS (2017)
All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks
Na Wang et al.
SENSORS (2017)
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
Rongxing Lu et al.
IEEE ACCESS (2017)
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things
Qinlong Huang et al.
IEEE ACCESS (2017)
Security and Privacy in Fog Computing: Challenges
Mithun Mukherjee et al.
IEEE ACCESS (2017)
LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing
Yan Huo et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing
Sultan Basudan et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
Pengfei Hu et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
IoT Applications on Secure Smart Shopping System
Ruinian Li et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
A Survey on Security and Privacy Issues in Internet-of-Things
Yuchen Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes
Tianyi Song et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos
Eman T. Hassan et al.
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW) (2017)
Towards product customization and personalization in IoT-enabled cloud manufacturing
Chen Yang et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)
Full autonomy: A novel individualized anonymity model for privacy preserving
Junqing Le et al.
COMPUTERS & SECURITY (2017)
Privacy-preserving data aggregation scheme against internal attackers in smart grids
Debiao He et al.
WIRELESS NETWORKS (2016)
Efficient smart metering based on homomorphic encryption
N. Busom et al.
COMPUTER COMMUNICATIONS (2016)
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
Anil Kumar Sutrala et al.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)
Fully secure fuzzy identity-based encryption for secure IoT communications
Yijun Mao et al.
COMPUTER STANDARDS & INTERFACES (2016)
A comprehensive approach to privacy in the cloud-based Internet of Things
Martin Henze et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
Privacy-Aware Multipath Video Caching for Content-Centric Networks
Qinghua Wu et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2016)
ON THE FEASIBILITY OF ATTRIBUTE-BASED ENCRYPTION ON INTERNET OF THINGS DEVICES
Moreno Ambrosin et al.
IEEE MICRO (2016)
Fog-Computing-Based Radio Access Networks: Issues and Challenges
Mugen Peng et al.
IEEE NETWORK (2016)
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
Zhihua Xia et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Forensic-by-Design Framework for Cyber-Physical Cloud Systems
Nurul Hidayah Ab Rahman et al.
IEEE Cloud Computing (2016)
Enhancing Lifelogging Privacy by Detecting Screens
Mohammed Korayem et al.
34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016 (2016)
A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems
Xinyu Yang et al.
COMPUTER NETWORKS (2015)
SecKit: A Model-based Security Toolkit for the Internet of Things
Ricardo Neisse et al.
COMPUTERS & SECURITY (2015)
CloudID: Trustworthy cloud-based and cross-enterprise biometric identification
Mohammad Haghighat et al.
EXPERT SYSTEMS WITH APPLICATIONS (2015)
Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
Surya Nepal et al.
IEEE CLOUD COMPUTING (2015)
Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
Soufiene Ben Othman et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications
Le Chen et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)
Privacy in Internet of Things: A Model and Protection Framework
Afshan Samani et al.
6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015) (2015)
Social Sensing: A New Approach to Understanding Our Socioeconomic Environments
Yu Liu et al.
ANNALS OF THE ASSOCIATION OF AMERICAN GEOGRAPHERS (2015)
Location leakage in distance bounding: Why location privacy does not work
Aikaterini Mitrokotsa et al.
COMPUTERS & SECURITY (2014)
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
Jinshu Su et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)
HETEROGENEOUS CLOUD RADIO ACCESS NETWORKS: A NEW PERSPECTIVE FOR ENHANCING SPECTRAL AND ENERGY EFFICIENCIES
Mugen Peng et al.
IEEE WIRELESS COMMUNICATIONS (2014)
In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-Mediating Technologies
Tamara Denning et al.
32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014) (2014)
Anonymous authentication for privacy-preserving IoT target-driven applications
Almudena Alcaide et al.
COMPUTERS & SECURITY (2013)
Fully Private Noninteractive Face Verification
Juan Ramon Troncoso-Pastoriza et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
Adaptive Traffic Signal Control With Vehicular Ad hoc Networks
Kartik Pandit et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2013)
Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks
Xiaodong Lin et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2013)
Security and privacy in electronic health records: A systematic literature review
Jose Luis Fernandez-Aleman et al.
JOURNAL OF BIOMEDICAL INFORMATICS (2013)
Protecting the sink location privacy in wireless sensor networks
Lin Yao et al.
PERSONAL AND UBIQUITOUS COMPUTING (2013)
Understanding metropolitan patterns of daily encounters
Lijun Sun et al.
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2013)
Combining Cloud and sensors in a smart city environment
Nathalie Mitton et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2012)
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
Kiran Mehta et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
Chien-Ming Chen et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy
Arshad Jhumka et al.
COMPUTER JOURNAL (2011)
Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Claude Castelluccia et al.
ACM TRANSACTIONS ON SENSOR NETWORKS (2009)