Location privacy in cognitive radio networks: A survey
Cognitive radio networks (CRNs) have emerged as an essential technology to enable
dynamic and opportunistic spectrum access which aims to exploit underutilized licensed …
dynamic and opportunistic spectrum access which aims to exploit underutilized licensed …
Applications of economic and pricing models for wireless network security: A survey
This paper provides a comprehensive literature review on applications of economic and
pricing theory to security issues in wireless networks. Unlike wireline networks, the …
pricing theory to security issues in wireless networks. Unlike wireline networks, the …
PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance
S Han, S Zhao, Q Li, CH Ju… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Wireless body area networks (WBANs), as a promising health-care system, can provide
tremendous benefits for timely and continuous patient care and remote health monitoring …
tremendous benefits for timely and continuous patient care and remote health monitoring …
[HTML][HTML] Privacy-preserving max/min query in two-tiered wireless sensor networks
In a two-tiered wireless sensor network, resource-limited sensor nodes act as the lower layer
for sensing data, and resource-rich storage nodes act as the upper layer for storing data and …
for sensing data, and resource-rich storage nodes act as the upper layer for storing data and …
Secure knn query processing in untrusted cloud environments
Mobile devices with geo-positioning capabilities (eg, GPS) enable users to access
information that is relevant to their present location. Users are interested in querying about …
information that is relevant to their present location. Users are interested in querying about …
Collaborative enforcement of firewall policies in virtual private networks
The widely deployed Virtual Private Network (VPN) technology allows roaming users to
build an encrypted tunnel to a VPN server, which henceforth allows roaming users to access …
build an encrypted tunnel to a VPN server, which henceforth allows roaming users to access …
Privacy-preserving search over encrypted personal health record in multi-source cloud
Cloud-based Personal Health Record systems (CB-PHR) have great potential in facilitating
the management of individual health records. Security and privacy concerns are among the …
the management of individual health records. Security and privacy concerns are among the …
Query privacy preserving for data aggregation in wireless sensor networks
X Liu, X Zhang, J Yu, C Fu - Wireless Communications and …, 2020 - Wiley Online Library
Wireless Sensor Networks (WSNs) are increasingly involved in many applications. However,
communication overhead and energy efficiency of sensor nodes are the major concerns in …
communication overhead and energy efficiency of sensor nodes are the major concerns in …
Top- Query Result Completeness Verification in Tiered Sensor Networks
Storage nodes are expected to be placed as an intermediate tier of large scale sensor
networks for caching the collected sensor readings and responding to queries with benefits …
networks for caching the collected sensor readings and responding to queries with benefits …
A digital watermarking approach to secure and precise range query processing in sensor networks
Two-tiered wireless sensor networks offer good scalability, efficient power usage, and space
saving. However, storage nodes are more attractive to attackers than sensors because they …
saving. However, storage nodes are more attractive to attackers than sensors because they …