Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks.
Haiping HuangTianhe GongPing ChenGuoxia QiuRuchuan WangPublished in: Int. J. Distributed Sens. Networks (2015)
Keyphrases
- third party
- distance computation
- trusted third party
- wireless sensor networks
- privacy protection
- mutual authentication
- sensitive information
- privacy preserving
- private information
- key agreement protocol
- key management
- sensitive data
- distance function
- key distribution
- data collection
- nearest neighbor
- similarity search
- sensor networks
- edit distance
- personal data
- resource constrained
- personal information
- routing protocol
- similarity measure
- data privacy
- data sharing
- security protocols
- digital signature
- information loss
- query processing
- data integration
- data management
- dimensionality reduction
- principal component analysis
- relational databases