[1] Chen Chienming, Lin Yuehsun, Lin Yaching, et al. RCDA:recoverable concealed data aggregation for data integrity in wireless sensor networks[J]. IEEE Trans on Parallel and Distributed Systems, 2012, 23(4):727-734.
[2] Jose J, Kumar M, Joyce J. Energy efficient recoverable concealed data aggregation in wireless sensor networks[C]//Proc of the IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology. Beijing:IEEE, 2013:322-329.
[3] Ren Shuqin, Aung K M, Park J S. A privacy enhanced data aggregation model[C]//Proc of the 10th IEEE International Conference on Computer and Information Technology. Bradford:IEEE, 2010:985-990.
[4] Wu Dapeng, Tang Jichao, Sun Qingwen. Recoverable concealed data aggregation for privacy preserving in wireless sensor networks[C]//Proc of 5th International Conference on Biomedical Engineering and Informatics. Chongqing:[s. n.], 2012:1499-1503.
[5] Yang Lijun, Ding Chao, Wu Meng. RPIDA:recoverable privacy-preserving integrity-assured data aggregation scheme for wireless sensor networks[J]. KSII Trans on Internet and Information Systems, 2015, 12(9):5189-5208.
[6] 秦智超, 周正, 赵小川. 一种分簇无线传感器网络中的分布式信源编码算法[J]. 电子与信息学报, 2013, 35(2):328-334. Qin Zhichao, Zhou Zheng, Zhao Xiaochuan. A distributed source coding algorithm for clustering wireless sensor networks[J]. Journal of Electronics and Information Technology, 2013, 35(2):328-334.
[7] Shen Limin, Ma Jianfeng, Liu Ximeng. A secure and efficient ID-based aggregate signature scheme for wireless sensor networks[EB/OL]. (2016-04-21). http://ieeexplore.ieee.org/document/7457608.
[8] Boneh D, Gentry C, Lynn B. Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proc of International Conference on Theory and Applications of Cryptographic Techniques. Warsaw:[s.n.], 2003:416-432. |