共 9 条
[4]
Localized monitoring of k NN queries in wireless sensor networks[J] . Yuxia Yao,Xueyan Tang,Ee-Peng Lim.The VLDB Journal . 2009 (1)
[6]
Security without identification: transaction systems to make big brother obsolete[J] . David Chaum.Communications of the ACM . 1985 (10)
[7]
Verifiableprivacy-preservingrangequeryintwo-tieredsensornetworks .2 ShengBo,LiQun. Proceedingsofthe27thIEEEInternationalConferenceonComputerCommunications[INFOCOM] . 2008
[8]
t-closeness:Privacy beyond k-anonymity and l-diversity .2 Li N,Li T. Proceedings of the23rd International Conference on Data Engineering (ICDE) . 2007
[9]
Confidentiality protection for distributed sensor data aggrega-tion .2 Feng Taiming,Wang Chuang,Zhang Wensheng,Ruan Lu. Proceedings of the27th IEEE International Conference on Computer Communications(INFOCOM) . 2008