An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
- 1 January 2012
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Efficient and provably secure aggregation of encrypted data in wireless sensor networksACM Transactions on Sensor Networks, 2009
- A Survey on the Encryption of Convergecast Traffic with In-Network ProcessingIEEE Transactions on Dependable and Secure Computing, 2008
- A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processingComputer Communications, 2008
- A Survey of Homomorphic Encryption for NonspecialistsEURASIP Journal on Information Security, 2007
- Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing AdaptationIEEE Transactions on Mobile Computing, 2006
- Secure comparison of encrypted data in wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Wireless sensor networks: a surveyComputer Networks, 2002
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002
- TAGPublished by Association for Computing Machinery (ACM) ,2002
- The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1988