A survey on homomorphic encryption schemes: Theory and implementation

A Acar, H Aksu, AS Uluagac, M Conti - ACM Computing Surveys (Csur), 2018 - dl.acm.org
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

Secure k-nearest neighbor query over encrypted data in outsourced environments

Y Elmehdwi, BK Samanthula… - 2014 IEEE 30th …, 2014 - ieeexplore.ieee.org
For the past decade, query processing on relational data has been studied extensively, and
many theoretical and practical solutions to query processing have been proposed under …

A new intrusion detection system based on KNN classification algorithm in wireless sensor network

W Li, P Yi, Y Wu, L Pan, J Li - Journal of Electrical and …, 2014 - Wiley Online Library
The Internet of Things has broad application in military field, commerce, environmental
monitoring, and many other fields. However, the open nature of the information media and …

A survey of security issues in wireless sensor networks

Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …

[PDF][PDF] A survey of homomorphic encryption for nonspecialists

C Fontaine, F Galand - EURASIP Journal on Information Security, 2007 - Springer
Processing encrypted signals requires special properties of the underlying encryption
scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose …

A survey on wireless sensor network security

J Sen - arXiv preprint arXiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …

Secure data aggregation in wireless sensor networks: A comprehensive overview

S Ozdemir, Y Xiao - Computer Networks, 2009 - Elsevier
Wireless sensor networks often consists of a large number of low-cost sensor nodes that
have strictly limited sensing, computation, and communication capabilities. Due to resource …

Secure nearest neighbor revisited

B Yao, F Li, X Xiao - … IEEE 29th international conference on data …, 2013 - ieeexplore.ieee.org
In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client
issues an encrypted query point E (q) to a cloud service provider and asks for an encrypted …