Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference17 articles.
1. Abuzneid AS, Sobh T, Faezipour M, Mahmood A, James J (2015) Fortified anonymous communication protocol for location privacy in WSN: a modular approach. Sensors 15:5820–5864
2. Anas B, Abdelshakour A, Ausif M (2016) Source anonymity in WSNs against global adversary utilizing low transmission rates with delay constraints. Sensor 16:957
3. Aseeri M, Ahmed M, Shakib M (2017) Detection of attacker and location in wireless sensor network as an application for border surveillance. Int J Distrib Sens Netw 13(11):1550147717740072
4. Cicek AE, Nergiz ME, Saygin Y (2014) Ensuring location diversity in privacy-preserving spatio-temporal data publishing. Int J Large Data Bases 23:609–625
5. Fabienne E, Aniket K, Matteo M, Francesca P, Ivan P (2014) Differentially private data aggregation with optimal utility. In: Proceedings of the 30th annual computer security applications conference, New Orleans, LA, USA, 8–12 December 2014, pp 316–325