Privacy-Aware Collaboration Among Untrusted Resource Constrained Devices

@inproceedings{MolinaMarkham2014PrivacyAwareCA,
  title={Privacy-Aware Collaboration Among Untrusted Resource Constrained Devices},
  author={Andres Molina-Markham},
  year={2014}
}
PRIVACY-AWARE COLLABORATION AMONG UNTRUSTED RESOURCE CONSTRAINED DEVICES 

References

Publications referenced by this paper.
Showing 1-10 of 122 references

A Batteryless Computational RFID and Sensing Platform

H. Zhang, J. Gummeson, B. Ransford, Fu, K. Moo
Tech. Rep. UM-CS-2011-020, • 2011
View 5 Excerpts
Highly Influenced

A database in every sensor

View 5 Excerpts
Highly Influenced

Privacy-Preserving Stream Aggregation with Fault Tolerance

IACR Cryptology ePrint Archive • 2011
View 10 Excerpts
Highly Influenced

Privacy-preserving smart metering

View 9 Excerpts
Highly Influenced

The Advantages of FRAM-Based Smart ICs for Next Generation Government

J. Pearson, T. Moise
Electronic IDs, • 2007
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…