共 50 条
- [21] Source-Location Privacy Based on Directed Greedy Walk in Wireless Sensor Networks [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
- [24] Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks [J]. COMPUTER JOURNAL, 2011, 54 (10): : 1603 - 1615
- [25] Preserving Source-Location Privacy through Redundant Fog Loop for Wireless Sensor Networks [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1836 - 1843
- [26] Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 327 - 331
- [28] A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (09): : 1736 - 1747
- [30] A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources [J]. Q2SWINET'19: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2019, : 93 - 99