Advanced Mathematics and Numerical Modeling of IoT

(lily) #1
protection,”INFORMS Journal on Computing,vol.22,no.3,pp.
471–481, 2010.

[34] P. Paillier, “Public-key cryptosystems based on composite
degree residuosity classes,” inProceedings of the 17th Interna-
tional Conference on Theory and Application of Cryptographic
Techniques, pp. 223–238, Springer, Prague, Czech Republic,
1999.
[35] K.-S. Wong and M. Kim, “Privacy-preserving data collection
with self-awareness protection,” inFrontier and Innovation in
Future Computing and Communications,J.J.Park,A.Zomaya,
H.-Y. Jeong, and M. Obaidat, Eds., vol. 301, pp. 365–371,
Springer,Amsterdam,TheNetherlands,2014.

Free download pdf