2018
DOI: 10.1504/ijguc.2018.093978
|View full text |Cite
|
Sign up to set email alerts
|

Consistent and effective energy utilisation of node model for securing data in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…As a hot topic for conflict resolution in crowdsourcing, the privacy issue in truth discovery has attracted significant attention, and various approaches based on cryptography [44][45][46][47][48][49] or differential privacy have been investigated. Miao et al [16] proposed the first privacypreserving approach called PPTD, which relies on the threshold homomorphic cryptosystem [50] to protect the confidentiality of the worker's answers and weights.…”
Section: Related Workmentioning
confidence: 99%
“…As a hot topic for conflict resolution in crowdsourcing, the privacy issue in truth discovery has attracted significant attention, and various approaches based on cryptography [44][45][46][47][48][49] or differential privacy have been investigated. Miao et al [16] proposed the first privacypreserving approach called PPTD, which relies on the threshold homomorphic cryptosystem [50] to protect the confidentiality of the worker's answers and weights.…”
Section: Related Workmentioning
confidence: 99%