Author:
Ngai Edith C.-H.,Rodhe Ioana
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference38 articles.
1. Akyildiz, I. F., Su, W., & Sandarasubramaniam, T. (2002). Wireless sensor networks: A survey. Computer Networks, 38(5), 393–422.
2. Jian, Y., Chen, S., Zhang, Z., & Zhang, L. (2007). Protecting receiver-location privacy in wireless sensor networks. In Proceedings of IEEE Infocom (pp. 1955–1963).
3. Hoh, B., & Gruteser, M. (2005). Protecting location privacy through path confusion. In Proceedings of IEEE/CreateNet international conference on security and privacy for emerging areas in communication networks (SecureComm).
4. Deng, J., Han, R. & Mishra, S. (2005). Countermeasures against traffic analysis attacks in wireless sensor networks. In Proceedings of IEEE/CreateNet international conference on security and privacy for emerging areas in communication networks (SecureComm).
5. Lou, W., & Kwon, Y. (2006). H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vechicular Technology, 55(4), 1320–1330.
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献