期刊文献+

物联网信息共享的安全隐私保护研究 被引量:4

原文传递
导出
摘要 随着物联网的应用普及,其信息共享的数据和用户的行为关系密切,因而物联网信息的感知性和敏感性对其信息共享的安全隐私保护要求越来越高。本文基于扩展泛化的K-匿名模型,进行了物联网的安全隐私建模,设计了一个具有良好的安全隐私保护的物联网共享平台,对其框架和设计要素进行了详细的分析。
作者 华颜涛 于彪
出处 《信息与电脑(理论版)》 2011年第6期5-6,共2页 China Computer & Communication
  • 相关文献

参考文献5

二级参考文献27

  • 1UIT. ITU Internet Reports 2005:The Internet of Things [R].2005.
  • 2Brin D.The Transparent Society[M].Reading MA:Perseus Books,1998.
  • 3Langheinrich M.A Privacy Awareness System for Ubiquitous Computing Environments[C].In 4th International Conference on Ubiquitous Computing(Ubicomp 2002),2002:237-245.
  • 4Mukherjee Saha A.Pervasive Computing:A Paradigm for the 21st Century[J].Computer,2003,36(3):25-31.
  • 5Goldwasser S.Multi Party Computations:Past and Present[C].Santa Barbara,California,United States:In Proceedings of the Sixteenth Annual ACM Symposium on Principies of Distributed Computing,1997.
  • 6Yao C.Protocols for Secure Computations[C].United States:In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science,1982.
  • 7Goldreich.The Foundations of Cryptography[M].Cambridge UK:Cambridge University Press,2004.
  • 8Du W,Atallah M J.Secure Multi-party Computation Problems and Their Applications:A Review and Open Problems[C].Cloudcroft,New Mexico:In Proceedings of the 2001 Workshop on New Security Paradigms,2001.
  • 9Chor B,Kushilevitz E,Goldreich O,et al.Private Information Retrieval[C].ACM,1998,45:965-981.
  • 10Atallah M J,Du W.Secure Multi-party Computational Geometry[C].In Proceedings of the 7th International Workshop on Algorithms and Data Structures,2001.

共引文献66

同被引文献43

  • 1王宇航,张宏莉.基于利益最大化的位置隐私保护技术研究[J].智能计算机与应用,2020,0(1):240-244. 被引量:3
  • 2Tian D, Georganas N D. Energy efficient routing with guaranteed delivery in wireless sensor networks / / Proceedings of the IEEE wireless communication and networking (WCNC 2003) New Orleans: IEEE, 2003:1923-1929.
  • 3Ganeriwal S, Srivastava M B. Reputation based ramework for high integrity sensor networks//proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks ( SASN' 04 ), New York: ACM, 2004:66 - 77.
  • 4Sun B , Wu K, Pooch U W. Zone--based intrusion detection for mobile ad hoc networks.Ad hoc & sensor wireless networks.2006,2(3): 1542-1552.
  • 5刘大鹏,徐久强,赵海,等.物联网中的信息服务发现[A].第八届沈阳科学学术年会论文集[c].2011.
  • 6白鹭,揭摄.移动通信网络对物联网承载需求分析[J].电信工程技术与标准化,2010(12).
  • 7Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 8Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 9Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 10Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)

引证文献4

二级引证文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部