Author:
Li Na,Zhang Nan,Das Sajal K.,Thuraisingham Bhavani
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference38 articles.
1. R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 2003, pp. 86–97.
2. R. Agrawal, R. Srikan, Privacy-preserving data mining, in: Proceedings of the 2000 ACM SIGMOD on Management of Data, Dallas, TX USA, May 15–18, 2000, pp. 439–450.
3. Wireless sensor networks: a Survey;Akyildiz;Computer Networks,2002
4. B. Carbunar, Y. Yu, L. Shi, M. Pearce, V. Vasudevan, Query privacy in wireless sensor networks, in: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007 (SECON’07), 18–21 June 2007, pp. 203–212.
5. D. Chaum, Blind signatures for untraceable payments, in: Advances in Cryptology – Crypto’82, Springer-Verlag (1983), 1982, pp. 199–203.
Cited by
179 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献