[1] Gnawali O, Jang K Y, Paek J, et al. The tenet architecture for tiered sensor networks[C]//Proceedings of ACM SenSys 2006. Colorado: ACM Press, 2006: 153-166.
[2] Jing Shi, Zhang Rui, Zhang Yanchao. A spatiotemporal approach for secure range queries in tiered sensor networks[J]. IEEE Trans Wireless Communications, 2011, 10(1): 264-273.
[3] Bo Sheng, Li Qun. Verifiable privacy-preserving sensor network storage for range query[J]. IEEE Transactions on Mobile Computing, 2011, 10(9): 1312-1326.
[4] Chen Fei, Alex X Liu. SafeQ: secure and efficient query processing in sensor networks[C]//Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM). San Diego: IEEE, 2010: 1-9.
[5] 蒋文涛, 吕俊伟, 杨曙辉, 等. 传感器网络中面向数据聚集的有向分簇算法[J]. 北京邮电大学学报, 2012, 35(3): 25-29. Jiang Wentao, Lü Junwei, Yang Shuhui, et al. A directional clustering algorithm for data aggregation in sensor networks[J]. Journal of Beijing University of Posts and Telecommunications, 2012, 35(3): 25-29.
[6] Yao Yonglei, Xiong Naixue, Hyuk Park, et al. Privacy-preserving max/min query in two-tiered wireless sensor networks[J]. Computers & Mathematics with Applications, 2013, 65(9): 1318-1325.
[7] Chan Haowen, Adrian Perrig. Efficient security primitives deried from a secure aggregation algorithm[C]//Proceedings of the ACM Conference on Computer and Communications Security (CCS). Alexandria: ACM Press, 2008: 521-534.
[8] Liu Dongxi, Wang Shenlu. Programmable order-preserving secure index for encrypted database query[C]//Proceedings of the 2012 IEEE 5th International Conference on Cloud Computing. Honolulu: IEEE, 2012: 502-509. |