A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
Sensor network security: a survey
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …
collect, and disseminate information in many types of applications. As sensor networks …
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
Secure k-nearest neighbor query over encrypted data in outsourced environments
Y Elmehdwi, BK Samanthula… - 2014 IEEE 30th …, 2014 - ieeexplore.ieee.org
For the past decade, query processing on relational data has been studied extensively, and
many theoretical and practical solutions to query processing have been proposed under …
many theoretical and practical solutions to query processing have been proposed under …
A new intrusion detection system based on KNN classification algorithm in wireless sensor network
W Li, P Yi, Y Wu, L Pan, J Li - Journal of Electrical and …, 2014 - Wiley Online Library
The Internet of Things has broad application in military field, commerce, environmental
monitoring, and many other fields. However, the open nature of the information media and …
monitoring, and many other fields. However, the open nature of the information media and …
A survey of security issues in wireless sensor networks
Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …
ecological, and health-related areas. These applications often include the monitoring of …
[PDF][PDF] A survey of homomorphic encryption for nonspecialists
C Fontaine, F Galand - EURASIP Journal on Information Security, 2007 - Springer
Processing encrypted signals requires special properties of the underlying encryption
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …
A survey on wireless sensor network security
J Sen - arXiv preprint arXiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …
community due their wide range of applications. Due to distributed nature of these networks …
Secure data aggregation in wireless sensor networks: A comprehensive overview
Wireless sensor networks often consists of a large number of low-cost sensor nodes that
have strictly limited sensing, computation, and communication capabilities. Due to resource …
have strictly limited sensing, computation, and communication capabilities. Due to resource …
Secure nearest neighbor revisited
In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client
issues an encrypted query point E (q) to a cloud service provider and asks for an encrypted …
issues an encrypted query point E (q) to a cloud service provider and asks for an encrypted …