Sciweavers

99 search results - page 9 / 20
» Privacy preservation schemes for querying wireless sensor ne...
Sort
View
IPSN
2005
Springer
14 years 29 days ago
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
— Sensor networks pose security and privacy challenges. One challenge is how to bootstrap secure communications among nodes. Several key pre-distribution schemes have been propos...
Zhen Yu, Yong Guan
TPDS
2008
120views more  TPDS 2008»
13 years 7 months ago
A New Storage Scheme for Approximate Location Queries in Object-Tracking Sensor Networks
Energy efficiency is one of the most critical issues in the design of wireless sensor networks. Observing that many sensor applications for object tracking can tolerate a certain d...
Jianliang Xu, Xueyan Tang, Wang-Chien Lee
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
ICDCS
2007
IEEE
14 years 1 months ago
Two-Tier Multiple Query Optimization for Sensor Networks
When there are multiple queries posed to the resourceconstrained wireless sensor network, it is critical to process them efficiently. In this paper, we propose a Two-Tier Multipl...
Shili Xiang, Hock-Beng Lim, Kian-Lee Tan, Yongluan...
SP
2003
IEEE
14 years 22 days ago
Random Key Predistribution Schemes for Sensor Networks
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because th...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song