共 37 条
[1]
Agrawal R., 2000, Privacy-preserving data mining, P439, DOI DOI 10.1145/342009.335438
[2]
Agrawal Rakesh, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[4]
[Anonymous], 1996, Stochastic Processes
[5]
Query privacy in wireless sensor networks
[J].
2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2,
2007,
:203-212
[6]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[7]
CRISTOFARO ED, 2009, P 2 ACM C W IN PRESS
[8]
Countermeasures against traffic analysis attacks in wireless sensor networks
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:113-124
[9]
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[10]
DENG J, 2006, PERVASIVE MOBILE COM, V2, P159