Search dblp for Publications

export results for "network confident"

 download as .bib file

@article{DBLP:journals/bib/KatchborianNetoABNFOBMLDSLC24,
  author       = {Albert Katchborian{-}Neto and
                  Matheus F. Alves and
                  Paula C. P. Bueno and
                  Karen de Jesus Nic{\'{a}}cio and
                  Miller S. Ferreira and
                  Tiago B. Oliveira and
                  Henrique Barbosa and
                  Michael Murgu and
                  Ana C. C. de Paula Ladvocat and
                  Danielle F. Dias and
                  Marisi G. Soares and
                  Jo{\~{a}}o Henrique Ghilardi Lago and
                  Daniela A Chagas{-}Paula},
  title        = {Integrative open workflow for confident annotation and molecular networking
                  of metabolomics {MSE/DIA} data},
  journal      = {Briefings Bioinform.},
  volume       = {25},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1093/bib/bbae013},
  doi          = {10.1093/BIB/BBAE013},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bib/KatchborianNetoABNFOBMLDSLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/IlliQAAARMRAA24,
  author       = {Elmehdi Illi and
                  Marwa K. Qaraqe and
                  Saud Althunibat and
                  Abdullah Al{-}Hasanat and
                  Moath Alsafasfeh and
                  Marcus de Ree and
                  Georgios Mantas and
                  Jonathan Rodriguez and
                  Waqas Aman and
                  Saif Al{-}Kuwari},
  title        = {Physical Layer Security for Authentication, Confidentiality, and Malicious
                  Node Detection: {A} Paradigm Shift in Securing IoT Networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {26},
  number       = {1},
  pages        = {347--388},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMST.2023.3327327},
  doi          = {10.1109/COMST.2023.3327327},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/IlliQAAARMRAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/XieZLHS24,
  author       = {Yifan Xie and
                  Jihua Zhu and
                  Shiqi Li and
                  Naiwen Hu and
                  Pengcheng Shi},
  title        = {{HECPG:} Hyperbolic Embedding and Confident Patch-Guided Network for
                  Point Cloud Matching},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {62},
  pages        = {1--12},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGRS.2024.3370591},
  doi          = {10.1109/TGRS.2024.3370591},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgrs/XieZLHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/VermaC24,
  author       = {Praveen Verma and
                  Chandan Chakraborty},
  title        = {High Impact Local Load Redistribution Attack Without Confidential
                  Network Information},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {15},
  number       = {2},
  pages        = {2383--2386},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSG.2023.3343125},
  doi          = {10.1109/TSG.2023.3343125},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/VermaC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-11531,
  author       = {Rongwu Xu and
                  Zhixuan Fang},
  title        = {Tempo: Confidentiality Preservation in Cloud-Based Neural Network
                  Training},
  journal      = {CoRR},
  volume       = {abs/2401.11531},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.11531},
  doi          = {10.48550/ARXIV.2401.11531},
  eprinttype    = {arXiv},
  eprint       = {2401.11531},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-11531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-12572,
  author       = {Chhavi Yadav and
                  Amrita Roy Chowdhury and
                  Dan Boneh and
                  Kamalika Chaudhuri},
  title        = {FairProof : Confidential and Certifiable Fairness for Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2402.12572},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.12572},
  doi          = {10.48550/ARXIV.2402.12572},
  eprinttype    = {arXiv},
  eprint       = {2402.12572},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-12572.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-03360,
  author       = {Mengyuan Li and
                  Shashvat Srivastava and
                  Mengjia Yan},
  title        = {Bridge the Future: High-Performance Networks in Confidential VMs without
                  Trusted {I/O} devices},
  journal      = {CoRR},
  volume       = {abs/2403.03360},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.03360},
  doi          = {10.48550/ARXIV.2403.03360},
  eprinttype    = {arXiv},
  eprint       = {2403.03360},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-03360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Pleska23,
  author       = {Arijus Pleska},
  title        = {Privacy-preserving Learning by Averaging in Collaborative Networks.
                  (Calcul des Moyennes dans des R{\'{e}}seaux Collaboratifs pour
                  l'Apprentissage Automatique et Pr{\'{e}}servant la Confidentialit{\'{e}})},
  school       = {University of Lille, France},
  year         = {2023},
  url          = {https://tel.archives-ouvertes.fr/tel-04198205},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Pleska23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AcharFBR23,
  author       = {Sandesh Achar and
                  Nuruzzaman Faruqui and
                  Anusha Bodepudi and
                  Manjunath Reddy},
  title        = {Confimizer: {A} Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost
                  Trade-Off Using BiLSTM Network},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {89205--89217},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3305506},
  doi          = {10.1109/ACCESS.2023.3305506},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AcharFBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ans/BobakZLO23,
  author       = {Carly A. Bobak and
                  Yifan Zhao and
                  Joshua J. Levy and
                  A. James O'Malley},
  title        = {{GRANDPA:} GeneRAtive network sampling using degree and property augmentation
                  applied to the analysis of partially confidential healthcare networks},
  journal      = {Appl. Netw. Sci.},
  volume       = {8},
  number       = {1},
  pages        = {23},
  year         = {2023},
  url          = {https://doi.org/10.1007/s41109-023-00548-5},
  doi          = {10.1007/S41109-023-00548-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ans/BobakZLO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/TagareN23,
  author       = {Trupti Shripad Tagare and
                  Rajashree Narendra},
  title        = {Confidentiality Enhancement Using Spread Spectrum Modulation Technique
                  for Aggregated Data in Wireless Sensor Networks},
  journal      = {J. Commun.},
  volume       = {18},
  number       = {5},
  pages        = {294--300},
  year         = {2023},
  url          = {https://doi.org/10.12720/jcm.18.5.294-300},
  doi          = {10.12720/JCM.18.5.294-300},
  timestamp    = {Wed, 31 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/TagareN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/XiaDYLYZT23,
  author       = {Yunzhi Xia and
                  Xianjun Deng and
                  Lingzhi Yi and
                  Shenghao Liu and
                  Laurence T. Yang and
                  Chenlu Zhu and
                  Xiao Tang},
  title        = {A Trust-Based Reliable Confident Information Coverage Model of Wireless
                  Sensor Networks for Intelligent Transportation},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {7},
  pages        = {9542--9554},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3253131},
  doi          = {10.1109/TVT.2023.3253131},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/XiaDYLYZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/XiaoDLXFYY23,
  author       = {Ziheng Xiao and
                  Xianjun Deng and
                  Hongwei Lu and
                  Yunzhi Xia and
                  Xiaoxuan Fan and
                  Lingzhi Yi and
                  Laurence T. Yang},
  title        = {Tensor and Confident Information Coverage Based Reliability Evaluation
                  for Large-Scale Intelligent Transportation Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {10},
  pages        = {13461--13473},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3275579},
  doi          = {10.1109/TVT.2023.3275579},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/XiaoDLXFYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aimlr/LiHWJBY23,
  author       = {Zhaokui Li and
                  Xu Huo and
                  Yan Wang and
                  Zihui Jiang and
                  Ke Bi and
                  Fengyuan Yang},
  title        = {Dual Confident Learning-based Network for Hyperspectral Image Classification
                  with Noisy Labels},
  booktitle    = {Asia Conference on Artificial Intelligence, Machine Learning and Robotics,
                  {AIMLR} 2023, Bangkok, Thailand, September 15-17, 2023},
  pages        = {18:1--18:5},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3625343.3625363},
  doi          = {10.1145/3625343.3625363},
  timestamp    = {Sat, 13 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aimlr/LiHWJBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/HlaingA23,
  author       = {Htet Htet Hlaing and
                  Hitoshi Asaeda},
  title        = {Ensuring Content Integrity and Confidentiality in Information-Centric
                  Secure Networks},
  booktitle    = {20th {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023},
  pages        = {810--816},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCNC51644.2023.10060672},
  doi          = {10.1109/CCNC51644.2023.10060672},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/HlaingA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/KahateR23,
  author       = {Sandip A. Kahate and
                  Atul D. Raut},
  title        = {An Enhanced Data Confidentiality in Online Social Networks Using Quantum
                  Key Management with a Blockchain Approach},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307914},
  doi          = {10.1109/ICCCNT56998.2023.10307914},
  timestamp    = {Thu, 30 Nov 2023 16:40:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/KahateR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ofc/SilvaSPPGMV23,
  author       = {Mois{\'{e}}s Felipe Silva and
                  Andrea Sgambelluri and
                  Alessandro Pacini and
                  Francesco Paolucci and
                  Andre Green and
                  David Mascare{\~{n}}as and
                  Luca Valcarenghi},
  title        = {Confidential Detection of Multiple Failures in Optical Networks: an
                  Experimental Evaluation},
  booktitle    = {Optical Fiber Communications Conference and Exhibition, {OFC} 2023,
                  San Diego, CA, USA, March 5-9, 2023},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/OFC49934.2023.10116347},
  doi          = {10.23919/OFC49934.2023.10116347},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ofc/SilvaSPPGMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LiMJTZG023,
  author       = {Dingji Li and
                  Zeyu Mi and
                  Chenhui Ji and
                  Yifan Tan and
                  Binyu Zang and
                  Haibing Guan and
                  Haibo Chen},
  editor       = {Julia Lawall and
                  Dan Williams},
  title        = {Bifrost: Analysis and Optimization of Network {I/O} Tax in Confidential
                  Virtual Machines},
  booktitle    = {2023 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2023, Boston,
                  MA, USA, July 10-12, 2023},
  pages        = {1--15},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/atc23/presentation/li-dingji},
  timestamp    = {Sat, 15 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/LiMJTZG023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-19574,
  author       = {Lin Hu and
                  Jiabing Fan and
                  Hong Wen and
                  Jie Tang and
                  Qianbin Chen},
  title        = {Confidential Signal Cancellation Phenomenon in Interference Alignment
                  Networks: Cause and Cure},
  journal      = {CoRR},
  volume       = {abs/2305.19574},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.19574},
  doi          = {10.48550/ARXIV.2305.19574},
  eprinttype    = {arXiv},
  eprint       = {2305.19574},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-19574.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Neto22,
  author       = {Renato Caminha Jua{\c{c}}aba{-}Neto},
  title        = {Privacy-aware aggregation of IoT streams in multi-owner networks.
                  (Agr{\'{e}}gation de flux de donn{\'{e}}es IoT confidentiels
                  dans des r{\'{e}}seaux multi-propri{\'{e}}taires)},
  school       = {University of Strasbourg, France},
  year         = {2022},
  url          = {https://tel.archives-ouvertes.fr/tel-04012692},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Neto22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BrahimiM22,
  author       = {Mohamed Amine Brahimi and
                  Fatiha Merazka},
  title        = {Data confidentiality-preserving schemes for random linear network
                  coding-capable networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {66},
  pages        = {103136},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103136},
  doi          = {10.1016/J.JISA.2022.103136},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BrahimiM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocnet/SilvaSPPGMV22,
  author       = {Mois{\'{e}}s Felipe Silva and
                  Andrea Sgambelluri and
                  Alessandro Pacini and
                  Francesco Paolucci and
                  Andre Green and
                  David Mascare{\~{n}}as and
                  Luca Valcarenghi},
  title        = {Confidentiality-preserving machine learning algorithms for soft-failure
                  detection in optical communication networks},
  journal      = {{JOCN}},
  volume       = {15},
  number       = {8},
  pages        = {C212--C222},
  year         = {2022},
  url          = {https://doi.org/10.1364/jocn.481690},
  doi          = {10.1364/JOCN.481690},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocnet/SilvaSPPGMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/HehirSN22,
  author       = {Jonathan Hehir and
                  Aleksandra B. Slavkovic and
                  Xiaoyue Niu},
  title        = {Consistent Spectral Clustering of Network Block Models under Local
                  Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {12},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.29012/jpc.811},
  doi          = {10.29012/JPC.811},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/HehirSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/ZhangCZFGFL22,
  author       = {Hui Zhang and
                  Junxin Chen and
                  Leo Yu Zhang and
                  Chong Fu and
                  Raffaele Gravina and
                  Giancarlo Fortino and
                  Zhihan Lv},
  title        = {Low-Cost and Confidential {ECG} Acquisition Framework Using Compressed
                  Sensing and Chaotic Systems for Wireless Body Area Network},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {26},
  number       = {12},
  pages        = {5783--5792},
  year         = {2022},
  url          = {https://doi.org/10.1109/JBHI.2022.3206232},
  doi          = {10.1109/JBHI.2022.3206232},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/ZhangCZFGFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/DengTYYXTZ22,
  author       = {Xianjun Deng and
                  Yuan Tian and
                  Lingzhi Yi and
                  Laurence Tianruo Yang and
                  Yunzhi Xia and
                  Xiao Tang and
                  Chenlu Zhu},
  title        = {Resilient Deployment of Smart Nodes for Improving Confident Information
                  Coverage in 5G IoT},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {18},
  number       = {3},
  pages        = {44:1--44:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3526196},
  doi          = {10.1145/3526196},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/DengTYYXTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icatech/LemeshkoYMG22,
  author       = {Oleksandr Lemeshko and
                  Oleksandra Yeremenko and
                  Amal Mersni and
                  Juraj Gazda},
  title        = {Improvement of Confidential Messages Secure Routing over Paths with
                  Intersection in Cyber Resilient Networks},
  booktitle    = {{XXVIII} International Conference on Information, Communication and
                  Automation Technologies, {ICAT} 2022, Sarajevo, Bosnia and Herzegovina,
                  June 16-18, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAT54566.2022.9811191},
  doi          = {10.1109/ICAT54566.2022.9811191},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icatech/LemeshkoYMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/TianXYTTZ22,
  author       = {Wensheng Tian and
                  Ruiyan Xia and
                  Zhichao Yan and
                  Panpan Tang and
                  Yonggang Tu and
                  Lei Zhang},
  title        = {Enhancing Intellectual Property Protection in Deep Neural Network
                  with Confidential Computing},
  booktitle    = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable
                  Computing {\&} Communications, Digital Twin, Privacy Computing,
                  Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta
                  2022, Haikou, China, December 15-18, 2022},
  pages        = {635--640},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00105},
  doi          = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00105},
  timestamp    = {Fri, 04 Aug 2023 17:34:39 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/TianXYTTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-10903,
  author       = {Laurens Sluijterman and
                  Eric Cator and
                  Tom Heskes},
  title        = {Confident Neural Network Regression with Bootstrapped Deep Ensembles},
  journal      = {CoRR},
  volume       = {abs/2202.10903},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.10903},
  eprinttype    = {arXiv},
  eprint       = {2202.10903},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-10903.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-05546,
  author       = {Stanislav Fort and
                  Ekin Dogus Cubuk and
                  Surya Ganguli and
                  Samuel S. Schoenholz},
  title        = {What does a deep neural network confidently perceive? The effective
                  dimension of high certainty class manifolds and their low confidence
                  boundaries},
  journal      = {CoRR},
  volume       = {abs/2210.05546},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.05546},
  doi          = {10.48550/ARXIV.2210.05546},
  eprinttype    = {arXiv},
  eprint       = {2210.05546},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-05546.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YehWHLC21,
  author       = {Chien{-}Hung Yeh and
                  Bo{-}Yin Wang and
                  Wei{-}Hung Hsu and
                  Wen{-}Piao Lin and
                  Chi{-}Wai Chow},
  title        = {Symmetry 28 Gbps/{\(\lambda\)} {WDM} Access Network Together With
                  Confidential Connection Between Two Specific Clients},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {122738--122743},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3109424},
  doi          = {10.1109/ACCESS.2021.3109424},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YehWHLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MadaniT21,
  author       = {Mahdi Madani and
                  Camel Tanougast},
  title        = {Optimized and robust implementation of mobile networks confidentiality
                  and integrity functions},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102093},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102093},
  doi          = {10.1016/J.COSE.2020.102093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MadaniT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/RauthanV21,
  author       = {J. S. Rauthan and
                  Kunwar Singh Vaisla},
  title        = {{VRS-DB:} preserve confidentiality of users' data using encryption
                  approach},
  journal      = {Digit. Commun. Networks},
  volume       = {7},
  number       = {1},
  pages        = {62--71},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.dcan.2019.08.001},
  doi          = {10.1016/J.DCAN.2019.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/RauthanV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FengCDYT21,
  author       = {Jie Feng and
                  Hongbin Chen and
                  Xianjun Deng and
                  Laurence Tianruo Yang and
                  Fangqing Tan},
  title        = {Confident Information Coverage Hole Prediction and Repairing for Healthcare
                  Big Data Collection in Large-Scale Hybrid Wireless Sensor Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {23},
  pages        = {16801--16813},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3045024},
  doi          = {10.1109/JIOT.2020.3045024},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/FengCDYT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/IqbalUAWAZK21,
  author       = {Jawaid Iqbal and
                  Arif Iqbal Umar and
                  Noor Ul Amin and
                  Abdul Waheed and
                  Saleem Abdullah and
                  Mahdi Zareei and
                  Muazzam Ali Khan Khattak},
  title        = {Efficient network selection using multi fuzzy criteria for confidential
                  data transmission in wireless body sensor networks},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {41},
  number       = {1},
  pages        = {37--55},
  year         = {2021},
  url          = {https://doi.org/10.3233/JIFS-191104},
  doi          = {10.3233/JIFS-191104},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/IqbalUAWAZK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BaoXZZD21,
  author       = {Ergute Bao and
                  Xiaokui Xiao and
                  Jun Zhao and
                  Dongping Zhang and
                  Bolin Ding},
  title        = {Synthetic Data Generation with Differential Privacy via Bayesian Networks},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.776},
  doi          = {10.29012/JPC.776},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BaoXZZD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/YangWHL21,
  author       = {Zhen Yang and
                  Wenyu Wang and
                  Yongfeng Huang and
                  Xing Li},
  title        = {A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {2},
  pages        = {842--850},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-019-01328-1},
  doi          = {10.1007/S11036-019-01328-1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/YangWHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/osn/SavvaME21,
  author       = {Giannis Savva and
                  Konstantinos Manousakis and
                  Georgios Ellinas},
  title        = {Confidentiality meets protection in elastic optical networks},
  journal      = {Opt. Switch. Netw.},
  volume       = {42},
  pages        = {100620},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.osn.2021.100620},
  doi          = {10.1016/J.OSN.2021.100620},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/osn/SavvaME21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/HarnXH21,
  author       = {Lein Harn and
                  Zhe Xia and
                  Chingfang Hsu},
  title        = {Non-interactive secure multi-party arithmetic computations with confidentiality
                  for {P2P} networks},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {2},
  pages        = {722--728},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-020-01029-7},
  doi          = {10.1007/S12083-020-01029-7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/HarnXH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/ZhangXDZ21,
  author       = {Xiaoyu Zhang and
                  Maochao Xu and
                  Gaofeng Da and
                  Peng Zhao},
  title        = {Ensuring confidentiality and availability of sensitive data over a
                  network system under cyber threats},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {214},
  pages        = {107697},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ress.2021.107697},
  doi          = {10.1016/J.RESS.2021.107697},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/ZhangXDZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/socnet/JariegoAH21,
  author       = {Isidro Maya Jariego and
                  Deniza Alieva and
                  Daniel Holgado},
  title        = {Confidentiality, power relations and evaluation of potential harm
                  in the study of the personal and organizational networks of travel
                  agents in Moscow},
  journal      = {Soc. Networks},
  volume       = {67},
  pages        = {55--64},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.socnet.2019.10.009},
  doi          = {10.1016/J.SOCNET.2019.10.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/socnet/JariegoAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/socnet/RudolphY21,
  author       = {Abby E. Rudolph and
                  April M. Young},
  title        = {Privacy and confidentiality considerations for collecting {HIV} risk
                  network data among men who have sex with men and implications for
                  constructing valid risk networks},
  journal      = {Soc. Networks},
  volume       = {67},
  pages        = {47--54},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.socnet.2019.09.002},
  doi          = {10.1016/J.SOCNET.2019.09.002},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/socnet/RudolphY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/AzeesVKN21,
  author       = {Maria Azees and
                  Pandi Vijayakumar and
                  Marimuthu Karuppiah and
                  Anand Nayyar},
  title        = {An efficient anonymous authentication and confidentiality preservation
                  schemes for secure communications in wireless body area networks},
  journal      = {Wirel. Networks},
  volume       = {27},
  number       = {3},
  pages        = {2119--2130},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11276-021-02560-y},
  doi          = {10.1007/S11276-021-02560-Y},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/AzeesVKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/ReeMRAQAAAOTUTA21,
  author       = {Marcus de Ree and
                  Georgios Mantas and
                  Jonathan Rodriguez and
                  Saud Althunibat and
                  Marwa K. Qaraqe and
                  Abdullah Al{-}Hasanat and
                  Saif M. Al{-}Kuwari and
                  Moath Alsafasfeh and
                  Gabriele Oligeri and
                  Seda Dogan Tusha and
                  Muhammad Usman and
                  Fatima Abu Taha and
                  Samiha Alfalahat and
                  Tasneem Alshamaseen and
                  Malak Qaisi},
  title        = {Data Confidentiality for IoT Networks: Cryptographic Gaps and Physical-Layer
                  Opportunities},
  booktitle    = {26th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks, {CAMAD} 2021, Porto, Portugal,
                  October 25-27, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CAMAD52502.2021.9617779},
  doi          = {10.1109/CAMAD52502.2021.9617779},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/camad/ReeMRAQAAAOTUTA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crowncom/JiNF21,
  author       = {Chenglan Ji and
                  Zhenyu Na and
                  Zilong Feng},
  editor       = {Huilong Jin and
                  Chungang Liu and
                  Al{-}Sakib Khan Pathan and
                  Zubair Md. Fadlullah and
                  Salimur Choudhury},
  title        = {Confidential Communications for Mobile {UAV} Relaying Network},
  booktitle    = {Cognitive Radio Oriented Wireless Networks and Wireless Internet -
                  16th {EAI} International Conference, {CROWNCOM} 2021, Virtual Event,
                  December 11, 2021, and 14th {EAI} International Conference, WiCON
                  2021, Virtual Event, November 9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {427},
  pages        = {240--250},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-98002-3\_18},
  doi          = {10.1007/978-3-030-98002-3\_18},
  timestamp    = {Fri, 01 Apr 2022 14:10:55 +0200},
  biburl       = {https://dblp.org/rec/conf/crowncom/JiNF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/ZhangWZ21,
  author       = {Zhiyi Zhang and
                  Su Yong Won and
                  Lixia Zhang},
  title        = {Investigating the Design Space for Name Confidentiality in Named Data
                  Networking},
  booktitle    = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San
                  Diego, CA, USA, November 29 - Dec. 2, 2021},
  pages        = {570--576},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MILCOM52596.2021.9652892},
  doi          = {10.1109/MILCOM52596.2021.9652892},
  timestamp    = {Thu, 15 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/ZhangWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/DasSS21,
  author       = {Tapadhir Das and
                  Raj Mani Shukla and
                  Shamik Sengupta},
  editor       = {Mauro Andreolini and
                  Mirco Marchetti and
                  Dimiter R. Avresky},
  title        = {The Devil is in the Details: Confident {\&} Explainable Anomaly
                  Detector for Software-Defined Networks},
  booktitle    = {20th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2021, Boston, MA, USA, November 23-26, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NCA53618.2021.9685157},
  doi          = {10.1109/NCA53618.2021.9685157},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nca/DasSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangLSY21,
  author       = {Xiao Wang and
                  Hongrui Liu and
                  Chuan Shi and
                  Cheng Yang},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Be Confident! Towards Trustworthy Graph Neural Networks via Confidence
                  Calibration},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {23768--23779},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/c7a9f13a6c0940277d46706c7ca32601-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/WangLSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/SchollerACBR21,
  author       = {R{\'{e}}my Scholler and
                  Ouma{\"{\i}}ma Alaoui{-}Isma{\"{\i}}li and
                  Jean{-}Fran{\c{c}}ois Couchot and
                  Eric Ballot and
                  Denis Renaud},
  editor       = {Michael Friedewald and
                  Stephan Krenn and
                  Ina Schiering and
                  Stefan Schiffner},
  title        = {Observing Road Freight Traffic from Mobile Network Signalling Data
                  While Respecting Privacy and Business Confidentiality},
  booktitle    = {Privacy and Identity Management. Between Data Protection and Security
                  - 16th {IFIP} {WG} 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer
                  School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021,
                  Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {644},
  pages        = {195--205},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-99100-5\_14},
  doi          = {10.1007/978-3-030-99100-5\_14},
  timestamp    = {Thu, 31 Mar 2022 15:05:39 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/SchollerACBR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/quatic/BarbareschiBFM21,
  author       = {Mario Barbareschi and
                  Salvatore Barone and
                  Alfonso Fezza and
                  Erasmo La Montagna},
  editor       = {Ana C. R. Paiva and
                  Ana Rosa Cavalli and
                  Paula Ventura Martins and
                  Ricardo P{\'{e}}rez{-}Castillo},
  title        = {Enforcing Mutual Authentication and Confidentiality in Wireless Sensor
                  Networks Using Physically Unclonable Functions: {A} Case Study},
  booktitle    = {Quality of Information and Communications Technology - 14th International
                  Conference, {QUATIC} 2021, Algarve, Portugal, September 8-11, 2021,
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1439},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85347-1\_22},
  doi          = {10.1007/978-3-030-85347-1\_22},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/quatic/BarbareschiBFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/JoudMBR21,
  author       = {Rapha{\"{e}}l Joud and
                  Pierre{-}Alain Mo{\"{e}}llic and
                  R{\'{e}}mi Bernhard and
                  Jean{-}Baptiste Rigaud},
  title        = {A Review of Confidentiality Threats Against Embedded Neural Network
                  Models},
  booktitle    = {7th {IEEE} World Forum on Internet of Things, WF-IoT 2021, New Orleans,
                  LA, USA, June 14 - July 31, 2021},
  pages        = {610--615},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WF-IoT51360.2021.9595434},
  doi          = {10.1109/WF-IOT51360.2021.9595434},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wf-iot/JoudMBR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-10612,
  author       = {Aleksandr Lenin and
                  Peeter Laud},
  title        = {Content Confidentiality in Named Data Networking},
  journal      = {CoRR},
  volume       = {abs/2102.10612},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.10612},
  eprinttype    = {arXiv},
  eprint       = {2102.10612},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-10612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-01401,
  author       = {Rapha{\"{e}}l Joud and
                  Pierre{-}Alain Mo{\"{e}}llic and
                  R{\'{e}}mi Bernhard and
                  Jean{-}Baptiste Rigaud},
  title        = {A Review of Confidentiality Threats Against Embedded Neural Network
                  Models},
  journal      = {CoRR},
  volume       = {abs/2105.01401},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.01401},
  eprinttype    = {arXiv},
  eprint       = {2105.01401},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-01401.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-14285,
  author       = {Xiao Wang and
                  Hongrui Liu and
                  Chuan Shi and
                  Cheng Yang},
  title        = {Be Confident! Towards Trustworthy Graph Neural Networks via Confidence
                  Calibration},
  journal      = {CoRR},
  volume       = {abs/2109.14285},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.14285},
  eprinttype    = {arXiv},
  eprint       = {2109.14285},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-14285.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc9065,
  author       = {Godred Fairhurst and
                  Colin Perkins},
  title        = {Considerations around Transport Header Confidentiality, Network Operations,
                  and the Evolution of Internet Transport Protocols},
  journal      = {{RFC}},
  volume       = {9065},
  pages        = {1--37},
  year         = {2021},
  url          = {https://doi.org/10.17487/RFC9065},
  doi          = {10.17487/RFC9065},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc9065.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-MolikiAA20,
  author       = {Yahya M. Al{-}Moliki and
                  Mohammed T. Alresheedi and
                  Yahya Al{-}Harthi},
  title        = {Improving Availability and Confidentiality via Hyperchaotic Baseband
                  Frequency Hopping Based on Optical {OFDM} in {VLC} Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {125013--125028},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3007429},
  doi          = {10.1109/ACCESS.2020.3007429},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Al-MolikiAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BajwaKMSMDA20,
  author       = {Muhammad Naseer Bajwa and
                  Suleman Khurram and
                  Mohsin Munir and
                  Shoaib Ahmed Siddiqui and
                  Muhammad Imran Malik and
                  Andreas Dengel and
                  Sheraz Ahmed},
  title        = {Confident Classification Using a Hybrid Between Deterministic and
                  Probabilistic Convolutional Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {115476--115485},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3004409},
  doi          = {10.1109/ACCESS.2020.3004409},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BajwaKMSMDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LiuWLWGN20,
  author       = {Zhixin Liu and
                  Sainan Wang and
                  Yang Liu and
                  Yu Wang and
                  Xinping Guan and
                  Dusit Niyato},
  title        = {Robust Secure Transmission and Power Transfer in Heterogeneous Networks
                  With Confidential Information},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {10},
  pages        = {11192--11205},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.3008349},
  doi          = {10.1109/TVT.2020.3008349},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/LiuWLWGN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ForsterCFPF20,
  author       = {Niklas F{\"{o}}rster and
                  Juan A. Cabrera and
                  Elke Franz and
                  Stefan Pfennig and
                  Frank H. P. Fitzek},
  title        = {Efficient Confidentiality for Network Coded Distributed Storage},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual
                  Event, Taiwan, December 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GLOBECOM42002.2020.9347955},
  doi          = {10.1109/GLOBECOM42002.2020.9347955},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ForsterCFPF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NisslmuellerF0D20,
  author       = {Utz Nisslmueller and
                  Klaus{-}Tycho Foerster and
                  Stefan Schmid and
                  Christian Decker},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Toward Active and Passive Confidentiality Attacks on Cryptocurrency
                  Off-chain Networks},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {7--14},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009429200070014},
  doi          = {10.5220/0009429200070014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NisslmuellerF0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icton/SavvaME20,
  author       = {Giannis Savva and
                  Konstantinos Manousakis and
                  Georgios Ellinas},
  title        = {Providing Confidentiality in Optical Networks: Metaheuristic Techniques
                  for the Joint Network Coding-Routing and Spectrum Allocation Problem},
  booktitle    = {22nd International Conference on Transparent Optical Networks, {ICTON}
                  2020, Bari, Italy, July 19-23, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICTON51198.2020.9203018},
  doi          = {10.1109/ICTON51198.2020.9203018},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icton/SavvaME20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/LuJYLLHL20,
  author       = {Yue Lu and
                  Jianguo Jiang and
                  Min Yu and
                  Chao Liu and
                  Chaochao Liu and
                  Weiqing Huang and
                  Zhiqiang Lv},
  editor       = {Gang Li and
                  Heng Tao Shen and
                  Ye Yuan and
                  Xiaoyang Wang and
                  Huawen Liu and
                  Xiang Zhao},
  title        = {Depthwise Separable Convolutional Neural Network for Confidential
                  Information Analysis},
  booktitle    = {Knowledge Science, Engineering and Management - 13th International
                  Conference, {KSEM} 2020, Hangzhou, China, August 28-30, 2020, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12275},
  pages        = {450--461},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55393-7\_40},
  doi          = {10.1007/978-3-030-55393-7\_40},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ksem/LuJYLLHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/RhimATSF20,
  author       = {Hana Rhim and
                  Ryma Abassi and
                  Karim Tamine and
                  Damien Sauveron and
                  Sihem Guemara El Fatmi},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {A secure network coding-enabled approach for a confidential cluster-based
                  routing in wireless sensor networks},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {2151--2157},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373969},
  doi          = {10.1145/3341105.3373969},
  timestamp    = {Thu, 02 Apr 2020 17:08:04 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/RhimATSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZimmermannBA20,
  author       = {Till Zimmermann and
                  Jan Bauer and
                  Nils Aschenbruck},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {CryptoCAN - Ensuring Confidentiality in Controller Area Networks for
                  Agriculture},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {79--90},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_06},
  doi          = {10.18420/SICHERHEIT2020\_06},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZimmermannBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-11844,
  author       = {Do Ngoc Diep},
  title        = {Statistical Tests and Confidential Intervals as Thresholds for Quantum
                  Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2001.11844},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.11844},
  eprinttype    = {arXiv},
  eprint       = {2001.11844},
  timestamp    = {Mon, 03 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-11844.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-00003,
  author       = {Utz Nisslmueller and
                  Klaus{-}Tycho Foerster and
                  Stefan Schmid and
                  Christian Decker},
  title        = {Toward Active and Passive Confidentiality Attacks On Cryptocurrency
                  Off-Chain Networks},
  journal      = {CoRR},
  volume       = {abs/2003.00003},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.00003},
  eprinttype    = {arXiv},
  eprint       = {2003.00003},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-00003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Hussain19,
  author       = {Mohibi Hussain},
  title        = {Availability, integrity, and confidentiality for content centric network
                  internet architectures},
  school       = {University of Cambridge, {UK}},
  year         = {2019},
  url          = {https://doi.org/10.17863/CAM.65956},
  doi          = {10.17863/CAM.65956},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Hussain19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Harrane19,
  author       = {Ibrahim El Khalil Harrane},
  title        = {Energy and privacy aware estimation over adaptive networks. (Estimation
                  distribu{\'{e}}e respectueuse de la consommation d'{\'{e}}nergie
                  et de la confidentialit{\'{e}} sur les r{\'{e}}seaux adaptatifs)},
  school       = {University of C{\^{o}}te d'Azur, Nice, France},
  year         = {2019},
  url          = {https://tel.archives-ouvertes.fr/tel-02529305},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Harrane19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FengC19,
  author       = {Jie Feng and
                  Hongbin Chen},
  title        = {Repairing Confident Information Coverage Holes for Big Data Collection
                  in Large-Scale Heterogeneous Wireless Sensor Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {155347--155360},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2949136},
  doi          = {10.1109/ACCESS.2019.2949136},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FengC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/BuIK19,
  author       = {Lake Bu and
                  Mihailo Isakov and
                  Michel A. Kinsy},
  title        = {A secure and robust scheme for sharing confidential information in
                  IoT systems},
  journal      = {Ad Hoc Networks},
  volume       = {92},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.adhoc.2018.09.007},
  doi          = {10.1016/J.ADHOC.2018.09.007},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/BuIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HurrahPSAM19,
  author       = {Nasir N. Hurrah and
                  Shabir A. Parah and
                  Javaid A. Sheikh and
                  Fadi Al{-}Turjman and
                  Khan Muhammad},
  title        = {Secure data transmission framework for confidentiality in IoTs},
  journal      = {Ad Hoc Networks},
  volume       = {95},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.adhoc.2019.101989},
  doi          = {10.1016/J.ADHOC.2019.101989},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/HurrahPSAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/Cai19,
  author       = {Zhongmin Cai},
  title        = {Security and confidentiality of network communication using chaotic
                  encryption technology},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {19},
  number       = {4},
  pages        = {1083--1092},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCM-193840},
  doi          = {10.3233/JCM-193840},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/Cai19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuK19,
  author       = {Charles Z. Liu and
                  Manolya Kavakli},
  title        = {A data-aware confidential tunnel for wireless sensor media networks},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {19},
  pages        = {26941--26963},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-017-4395-5},
  doi          = {10.1007/S11042-017-4395-5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShabbirSRA19,
  author       = {Aysha Shabbir and
                  Maryam Shabbir and
                  Muhammad Rizwan and
                  Fahad Ahmad},
  title        = {Ensuring the Confidentiality of Nuclear Information at Cloud Using
                  Modular Encryption Standard},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2509898:1--2509898:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2509898},
  doi          = {10.1155/2019/2509898},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShabbirSRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/JiangYZJDWLL19,
  author       = {Yalan Jiang and
                  Lingzhi Yi and
                  Lu Zhu and
                  Zhenkun Jin and
                  Xianjun Deng and
                  Minghua Wang and
                  Yong Liu and
                  Xiangyang Li},
  title        = {A Novel Strategy for Barrier Confident Information Coverage in Sensor
                  Networks},
  booktitle    = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
                  Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud
                  and Big Data Computing, Intl Conf on Cyber Science and Technology
                  Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August
                  5-8, 2019},
  pages        = {228--231},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00049},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00049},
  timestamp    = {Sun, 10 Nov 2019 16:47:28 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/JiangYZJDWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/GomezWMD19,
  author       = {Laurent Gomez and
                  Marcus Wilhelm and
                  Jos{\'{e}} M{\'{a}}rquez and
                  Patrick Duverger},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {Security for Distributed Deep Neural Networks: Towards Data Confidentiality
                  {\&} Intellectual Property Protection},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {439--447},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007922404390447},
  doi          = {10.5220/0007922404390447},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/GomezWMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iddm/DronyukFLK19,
  author       = {Ivanna Dronyuk and
                  Olga Fedevych and
                  Danylo Lizanets and
                  Natalia Kryvinska},
  editor       = {Nataliya Shakhovska and
                  Ivan Izonin and
                  Sergio Montenegro and
                  Yannick Est{\`{e}}ve and
                  Jaime Campos and
                  Natalia Kryvinska},
  title        = {An Overview of Ateb-Theory Mathematical Apparatus for Data Confidentiality
                  in Medical Computer Networks},
  booktitle    = {Proceedings of the 2nd International Workshop on Informatics {\&}
                  Data-Driven Medicine {(IDDM} 2019), Lviv, Ukraine, November 11-13,
                  2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2488},
  pages        = {175--184},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2488/paper15.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:42 +0100},
  biburl       = {https://dblp.org/rec/conf/iddm/DronyukFLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ZhuWJDYLW19,
  author       = {Lihua Zhu and
                  Minghua Wang and
                  Kaiwu Jiang and
                  Xianjun Deng and
                  Lingzhi Yi and
                  Xiangbai Liao and
                  Chao Wang},
  title        = {Robot-Assisted Sensor Relocation for Confident Information Coverage
                  in Wireless Sensor and Robot Networks},
  booktitle    = {2019 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking,
                  ISPA/BDCloud/SocialCom/SustainCom 2019, Xiamen, China, December 16-18,
                  2019},
  pages        = {256--262},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00046},
  doi          = {10.1109/ISPA-BDCLOUD-SUSTAINCOM-SOCIALCOM48970.2019.00046},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/ZhuWJDYLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miccai/ZhangLMWA19,
  author       = {Min Zhang and
                  Kevin H. Leung and
                  Zili Ma and
                  Jin Wen and
                  Gopal Avinash},
  editor       = {Hayit Greenspan and
                  Ryutaro Tanno and
                  Marius Erdt and
                  Tal Arbel and
                  Christian F. Baumgartner and
                  Adrian V. Dalca and
                  Carole H. Sudre and
                  William M. Wells III and
                  Klaus Drechsler and
                  Marius George Linguraru and
                  Cristina Oyarzun Laura and
                  Raj Shekhar and
                  Stefan Wesarg and
                  Miguel {\'{A}}ngel Gonz{\'{a}}lez Ballester},
  title        = {A Generalized Approach to Determine Confident Samples for Deep Neural
                  Networks on Unseen Data},
  booktitle    = {Uncertainty for Safe Utilization of Machine Learning in Medical Imaging
                  and Clinical Image-Based Procedures - First International Workshop,
                  {UNSURE} 2019, and 8th International Workshop, {CLIP} 2019, Held in
                  Conjunction with {MICCAI} 2019, Shenzhen, China, October 17, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11840},
  pages        = {65--74},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32689-0\_7},
  doi          = {10.1007/978-3-030-32689-0\_7},
  timestamp    = {Wed, 16 Oct 2019 11:16:06 +0200},
  biburl       = {https://dblp.org/rec/conf/miccai/ZhangLMWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-06292,
  author       = {Sercan {\"{O}}mer Arik and
                  Tomas Pfister},
  title        = {Attention-Based Prototypical Learning Towards Interpretable, Confident
                  and Robust Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1902.06292},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.06292},
  eprinttype    = {arXiv},
  eprint       = {1902.06292},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-06292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-04246,
  author       = {Laurent Gomez and
                  Marcus Wilhelm and
                  Jos{\'{e}} M{\'{a}}rquez and
                  Patrick Duverger},
  title        = {Security for Distributed Deep Neural Networks Towards Data Confidentiality
                  {\&} Intellectual Property Protection},
  journal      = {CoRR},
  volume       = {abs/1907.04246},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.04246},
  eprinttype    = {arXiv},
  eprint       = {1907.04246},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-04246.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00991,
  author       = {Sayed Ashraf Mamun},
  title        = {Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity
                  in {WBAN}},
  journal      = {CoRR},
  volume       = {abs/1910.00991},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00991},
  eprinttype    = {arXiv},
  eprint       = {1910.00991},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00991.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DengTYY18,
  author       = {Xianjun Deng and
                  Zujun Tang and
                  Lingzhi Yi and
                  Laurence T. Yang},
  title        = {Healing Multimodal Confident Information Coverage Holes in NB-IoT-Enabled
                  Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {3},
  pages        = {1463--1473},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2017.2783258},
  doi          = {10.1109/JIOT.2017.2783258},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DengTYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/YiDZDY18,
  author       = {Lingzhi Yi and
                  Xianjun Deng and
                  Zenghui Zou and
                  Dexin Ding and
                  Laurence T. Yang},
  title        = {Confident information coverage hole detection in sensor networks for
                  uranium tailing monitoring},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {118},
  number       = {Part},
  pages        = {57--66},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jpdc.2017.03.005},
  doi          = {10.1016/J.JPDC.2017.03.005},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/YiDZDY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/CuiSZXL18,
  author       = {Jie Cui and
                  Lili Shao and
                  Hong Zhong and
                  Yan Xu and
                  Lu Liu},
  title        = {Data aggregation with end-to-end confidentiality and integrity for
                  large-scale wireless sensor networks},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {5},
  pages        = {1022--1037},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0581-5},
  doi          = {10.1007/S12083-017-0581-5},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/CuiSZXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunZQHM18,
  author       = {Jiameng Sun and
                  Binrui Zhu and
                  Jing Qin and
                  Jiankun Hu and
                  Jixin Ma},
  title        = {Confidentiality-Preserving Publicly Verifiable Computation Schemes
                  for Polynomial Evaluation and Matrix-Vector Multiplication},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {5275132:1--5275132:15},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/5275132},
  doi          = {10.1155/2018/5275132},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunZQHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/XiaoLY18,
  author       = {Kejiang Xiao and
                  Jian Li and
                  Chunhua Yang},
  title        = {Exploiting Correlation for Confident Sensing in Fusion-Based Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {65},
  number       = {6},
  pages        = {4962--4972},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIE.2017.2756591},
  doi          = {10.1109/TIE.2017.2756591},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tie/XiaoLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/DengTYLW18,
  author       = {Xianjun Deng and
                  Zujun Tang and
                  Laurence Tianruo Yang and
                  Man Lin and
                  Bang Wang},
  title        = {Confident Information Coverage Hole Healing in Hybrid Industrial Wireless
                  Sensor Networks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {14},
  number       = {5},
  pages        = {2220--2229},
  year         = {2018},
  url          = {https://doi.org/10.1109/TII.2017.2764038},
  doi          = {10.1109/TII.2017.2764038},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/DengTYLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhaoHSL18,
  author       = {Xiaozhao Zhao and
                  Yuexian Hou and
                  Dawei Song and
                  Wenjie Li},
  title        = {A Confident Information First Principle for Parameter Reduction and
                  Model Selection of Boltzmann Machines},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {29},
  number       = {5},
  pages        = {1608--1621},
  year         = {2018},
  url          = {https://doi.org/10.1109/TNNLS.2017.2664100},
  doi          = {10.1109/TNNLS.2017.2664100},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhaoHSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/XiaoAPD18,
  author       = {Wei Xiao and
                  Yong Ai and
                  Dun Pu and
                  Zhicheng Dong},
  title        = {The Design and Simulation of Neural Network Encoder in Confidential
                  Communication Field},
  journal      = {Wirel. Pers. Commun.},
  volume       = {102},
  number       = {4},
  pages        = {3769--3779},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11277-018-5408-z},
  doi          = {10.1007/S11277-018-5408-Z},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/XiaoAPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BorgsCSZ18,
  author       = {Christian Borgs and
                  Jennifer T. Chayes and
                  Adam D. Smith and
                  Ilias Zadik},
  editor       = {Mikkel Thorup},
  title        = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private
                  Graphon Estimation},
  booktitle    = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2018, Paris, France, October 7-9, 2018},
  pages        = {533--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/FOCS.2018.00057},
  doi          = {10.1109/FOCS.2018.00057},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BorgsCSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/GomezIMD18,
  author       = {Laurent Gomez and
                  Alberto Ibarrondo and
                  Jos{\'{e}} M{\'{a}}rquez and
                  Patrick Duverger},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Intellectual Property Protection for Distributed Neural Networks -
                  Towards Confidentiality of Data, Model, and Inference},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {313--320},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006854703130320},
  doi          = {10.5220/0006854703130320},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/GomezIMD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/PuskaNS18,
  author       = {Alisson Puska and
                  Michele Nogueira and
                  Aldri Santos},
  title        = {Confidentiality-Aware Decision on Handoffs under Uncertainty on Heterogeneous
                  Wireless Networks},
  booktitle    = {2018 {IEEE} Symposium on Computers and Communications, {ISCC} 2018,
                  Natal, Brazil, June 25-28, 2018},
  pages        = {884--889},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISCC.2018.8538677},
  doi          = {10.1109/ISCC.2018.8538677},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/PuskaNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbis/RompasP18,
  author       = {Patrice Samuel Rompas and
                  Riza Satria Perdana},
  title        = {Securing Confidential Documents in Local Network Using an Email Filtering
                  Technique},
  booktitle    = {2018 International Workshop on Big Data and Information Security,
                  {IWBIS} 2018, Jakarta, Indonesia, May 12-13, 2018},
  pages        = {137--141},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWBIS.2018.8471696},
  doi          = {10.1109/IWBIS.2018.8471696},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/iwbis/RompasP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miccai/WangZTSFY18,
  author       = {Yan Wang and
                  Yuyin Zhou and
                  Peng Tang and
                  Wei Shen and
                  Elliot K. Fishman and
                  Alan L. Yuille},
  editor       = {Alejandro F. Frangi and
                  Julia A. Schnabel and
                  Christos Davatzikos and
                  Carlos Alberola{-}L{\'{o}}pez and
                  Gabor Fichtinger},
  title        = {Training Multi-organ Segmentation Networks with Sample Selection by
                  Relaxed Upper Confident Bound},
  booktitle    = {Medical Image Computing and Computer Assisted Intervention - {MICCAI}
                  2018 - 21st International Conference, Granada, Spain, September 16-20,
                  2018, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11073},
  pages        = {434--442},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00937-3\_50},
  doi          = {10.1007/978-3-030-00937-3\_50},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/miccai/WangZTSFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-02595,
  author       = {Yan Wang and
                  Yuyin Zhou and
                  Peng Tang and
                  Wei Shen and
                  Elliot K. Fishman and
                  Alan L. Yuille},
  title        = {Training Multi-organ Segmentation Networks with Sample Selection by
                  Relaxed Upper Confident Bound},
  journal      = {CoRR},
  volume       = {abs/1804.02595},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.02595},
  eprinttype    = {arXiv},
  eprint       = {1804.02595},
  timestamp    = {Wed, 19 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-02595.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-02183,
  author       = {Christian Borgs and
                  Jennifer T. Chayes and
                  Adam D. Smith and
                  Ilias Zadik},
  title        = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private
                  Graphon Estimation},
  journal      = {CoRR},
  volume       = {abs/1810.02183},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.02183},
  eprinttype    = {arXiv},
  eprint       = {1810.02183},
  timestamp    = {Thu, 01 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-02183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ErmisBAC17,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  title        = {A key agreement protocol with partial backward confidentiality},
  journal      = {Comput. Networks},
  volume       = {129},
  pages        = {159--177},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2017.09.008},
  doi          = {10.1016/J.COMNET.2017.09.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ErmisBAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhangHWS17,
  author       = {Shengnan Zhang and
                  Yuexian Hou and
                  Benyou Wang and
                  Dawei Song},
  title        = {Regularizing Neural Networks via Retaining Confident Connections},
  journal      = {Entropy},
  volume       = {19},
  number       = {7},
  pages        = {313},
  year         = {2017},
  url          = {https://doi.org/10.3390/e19070313},
  doi          = {10.3390/E19070313},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhangHWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VorakulpipatSRS17,
  author       = {Chalee Vorakulpipat and
                  Soontorn Sirapaisan and
                  Ekkachan Rattanalerdnusorn and
                  Visut Savangsuk},
  title        = {A Policy-Based Framework for Preserving Confidentiality in {BYOD}
                  Environments: {A} Review of Information Security Perspectives},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {2057260:1--2057260:11},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/2057260},
  doi          = {10.1155/2017/2057260},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VorakulpipatSRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LeguayPQS17,
  author       = {Jeremie Leguay and
                  Georgios S. Paschos and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {CryptoCache: Network caching with confidentiality},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996866},
  doi          = {10.1109/ICC.2017.7996866},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LeguayPQS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PfennigF17,
  author       = {Stefan Pfennig and
                  Elke Franz},
  title        = {Security aspects of confidential network coding},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996934},
  doi          = {10.1109/ICC.2017.7996934},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/PfennigF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/PereyraTCKH17,
  author       = {Gabriel Pereyra and
                  George Tucker and
                  Jan Chorowski and
                  Lukasz Kaiser and
                  Geoffrey E. Hinton},
  title        = {Regularizing Neural Networks by Penalizing Confident Output Distributions},
  booktitle    = {5th International Conference on Learning Representations, {ICLR} 2017,
                  Toulon, France, April 24-26, 2017, Workshop Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2017},
  url          = {https://openreview.net/forum?id=HyhbYrGYe},
  timestamp    = {Thu, 04 Apr 2019 13:20:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/PereyraTCKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/YangRN17,
  author       = {Jiasen Yang and
                  Bruno Ribeiro and
                  Jennifer Neville},
  title        = {Should We Be Confident in Peer Effects Estimated From Social Network
                  Crawls?},
  booktitle    = {Proceedings of the Eleventh International Conference on Web and Social
                  Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
                  May 15-18, 2017},
  pages        = {708--711},
  publisher    = {{AAAI} Press},
  year         = {2017},
  url          = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15696},
  timestamp    = {Wed, 28 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwsm/YangRN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbesc/SilvaZ17,
  author       = {Marcos Roberto Silva and
                  C{\'{e}}sar Albenes Zeferino},
  title        = {Confidentiality and Authenticity in a Platform Based on Network-on-Chip},
  booktitle    = {{VII} Brazilian Symposium on Computing Systems Engineering, {SBESC}
                  2017, Curitiba, PR, Brazil, November 6-10, 2017},
  pages        = {225--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SBESC.2017.38},
  doi          = {10.1109/SBESC.2017.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sbesc/SilvaZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/DaiWDY17,
  author       = {Lu Dai and
                  Bang Wang and
                  Xianjun Deng and
                  Laurence T. Yang},
  title        = {An improved immune algorithm for node relocation to maximize confident
                  information coverage in a hybrid sensor network},
  booktitle    = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco,
                  CA, USA, August 4-8, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/UIC-ATC.2017.8397492},
  doi          = {10.1109/UIC-ATC.2017.8397492},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/DaiWDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PereyraTCKH17,
  author       = {Gabriel Pereyra and
                  George Tucker and
                  Jan Chorowski and
                  Lukasz Kaiser and
                  Geoffrey E. Hinton},
  title        = {Regularizing Neural Networks by Penalizing Confident Output Distributions},
  journal      = {CoRR},
  volume       = {abs/1701.06548},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.06548},
  eprinttype    = {arXiv},
  eprint       = {1701.06548},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PereyraTCKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Kasten16,
  author       = {Andreas Kasten},
  title        = {Secure semantic web data management: confidentiality, integrity, and
                  compliant availability in open and distributed networks},
  school       = {University of Koblenz and Landau, Germany},
  year         = {2016},
  url          = {https://kola.opus.hbz-nrw.de/frontdoor/index/index/docId/1393},
  urn          = {urn:nbn:de:kola-13939},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Kasten16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/OthmanBTY16,
  author       = {Soufiene Ben Othman and
                  Abdullah Ali Bahattab and
                  Abdelbasset Trad and
                  Habib Youssef},
  title        = {Lightweight and confidential data aggregation in healthcare wireless
                  sensor networks},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {27},
  number       = {4},
  pages        = {576--588},
  year         = {2016},
  url          = {https://doi.org/10.1002/ett.2993},
  doi          = {10.1002/ETT.2993},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/OthmanBTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpsa/MedhaneS16,
  author       = {Darshan Vishwasrao Medhane and
                  Arun Kumar Sangaiah},
  title        = {Source node position confidentiality aspects in wireless networks:
                  an extended review},
  journal      = {Int. J. High Perform. Syst. Archit.},
  volume       = {6},
  number       = {2},
  pages        = {61--81},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJHPSA.2016.078785},
  doi          = {10.1504/IJHPSA.2016.078785},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijhpsa/MedhaneS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BagciRRV16,
  author       = {Ibrahim Ethem Bagci and
                  Shahid Raza and
                  Utz Roedig and
                  Thiemo Voigt},
  title        = {Fusion: coalesced confidential storage and communication framework
                  for the IoT},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2656--2673},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1260},
  doi          = {10.1002/SEC.1260},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BagciRRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhuW16,
  author       = {Jiajun Zhu and
                  Bang Wang},
  title        = {The Optimal Placement Pattern for Confident Information Coverage in
                  Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {1022--1032},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMC.2015.2444397},
  doi          = {10.1109/TMC.2015.2444397},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/SarikayaKE16,
  author       = {Yunus Sarikaya and
                  Can Emre Koksal and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin},
  title        = {Dynamic Network Control for Confidential Multi-Hop Communications},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {2},
  pages        = {1181--1195},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2015.2414945},
  doi          = {10.1109/TNET.2015.2414945},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/SarikayaKE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangZYM16,
  author       = {Bang Wang and
                  Jiajun Zhu and
                  Laurence T. Yang and
                  Yijun Mo},
  title        = {Sensor Density for Confident Information Coverage in Randomly Deployed
                  Sensor Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {15},
  number       = {5},
  pages        = {3238--3250},
  year         = {2016},
  url          = {https://doi.org/10.1109/TWC.2016.2518689},
  doi          = {10.1109/TWC.2016.2518689},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WangZYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cmcsn/MengHSCH16,
  author       = {S. H. Meng and
                  A. C. Huang and
                  Tien{-}Wen Sung and
                  C. C. Chen and
                  J. F. Huang},
  title        = {Enhancing Internet Networks Confidentiality Based on Composite Coding
                  and Channels Coding Schemes of Signatures Reconfiguration},
  booktitle    = {Third International Conference on Computing Measurement Control and
                  Sensor Network, {CMCSN} 2016, Matsue, Japan, May 20-22, 2016},
  pages        = {64--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CMCSN.2016.52},
  doi          = {10.1109/CMCSN.2016.52},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cmcsn/MengHSCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dihu/Vugt16,
  author       = {Ingeborg van Vugt},
  editor       = {Maciej Eder and
                  Jan Rybicki},
  title        = {Exploring Networks Of Confidentiality And Secrecy In Early Modern
                  Transconfessional Correspondences},
  booktitle    = {11th Annual International Conference of the Alliance of Digital Humanities
                  Organizations, {DH} 2016, Krakow, Poland, July 11-16, 2016, Conference
                  Abstracts},
  pages        = {699--701},
  publisher    = {Alliance of Digital Humanities Organizations {(ADHO)}},
  year         = {2016},
  url          = {http://dh2016.adho.org/abstracts/53},
  timestamp    = {Fri, 10 Jul 2020 11:43:01 +0200},
  biburl       = {https://dblp.org/rec/conf/dihu/Vugt16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/XiongW16,
  author       = {Zehui Xiong and
                  Bang Wang},
  editor       = {Xinyi Huang and
                  Yang Xiang and
                  Kuan{-}Ching Li},
  title        = {Minimizing Confident Information Coverage Breach in Rechargeable Wireless
                  Sensor Networks with Uneven Recharging Rates},
  booktitle    = {Green, Pervasive, and Cloud Computing - 11th International Conference,
                  {GPC} 2016, Xi'an, China, May 6-8, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9663},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39077-2\_14},
  doi          = {10.1007/978-3-319-39077-2\_14},
  timestamp    = {Thu, 24 Feb 2022 11:50:56 +0100},
  biburl       = {https://dblp.org/rec/conf/gpc/XiongW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/TangDYW16,
  author       = {Zujun Tang and
                  Xianjun Deng and
                  Lingzhi Yi and
                  Bang Wang},
  editor       = {Xingang Liu and
                  Tie Qiu and
                  Bin Guo and
                  Kaixuan Lu and
                  Zhaolong Ning and
                  Mianxiong Dong and
                  Yayong Li},
  title        = {An Energy Efficient Confident Information Coverage Hole Healing Algorithm
                  in Hybrid Sensor Networks},
  booktitle    = {2016 {IEEE} International Conference on Internet of Things (iThings)
                  and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
                  Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
                  (SmartData), Chengdu, China, December 15-18, 2016},
  pages        = {705--710},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.151},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.151},
  timestamp    = {Mon, 14 Dec 2020 13:52:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/TangDYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/ZouDYTWG16,
  author       = {Zenghui Zou and
                  Xianjun Deng and
                  Lingzhi Yi and
                  Zujun Tang and
                  Minghua Wang and
                  Xueyu Gong},
  editor       = {Xingang Liu and
                  Tie Qiu and
                  Bin Guo and
                  Kaixuan Lu and
                  Zhaolong Ning and
                  Mianxiong Dong and
                  Yayong Li},
  title        = {A Novel Confident Information Coverage Hole Detection Algorithm in
                  Sensor Networks},
  booktitle    = {2016 {IEEE} International Conference on Internet of Things (iThings)
                  and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
                  Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
                  (SmartData), Chengdu, China, December 15-18, 2016},
  pages        = {199--204},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.57},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.57},
  timestamp    = {Sun, 14 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/ZouDYTWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Lopez-RamosRSS16,
  author       = {Juan Antonio L{\'{o}}pez{-}Ramos and
                  Joachim Rosenthal and
                  Davide Schipani and
                  Reto Schnyder},
  title        = {An Application of Group Theory in Confidential Network Communications},
  journal      = {CoRR},
  volume       = {abs/1610.09244},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.09244},
  eprinttype    = {arXiv},
  eprint       = {1610.09244},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Lopez-RamosRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Junemann15,
  author       = {Konrad J{\"{u}}nemann},
  title        = {Confidential Data-Outsourcing and Self-Optimizing P2P-Networks: Coping
                  with the Challenges of Multi-Party Systems},
  school       = {Karlsruhe Institute of Technology},
  year         = {2015},
  url          = {https://nbn-resolving.org/urn:nbn:de:0072-450689},
  urn          = {urn:nbn:de:0072-450689},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Junemann15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/MostefaouiNF15,
  author       = {Ahmed Mostefaoui and
                  Hassan Noura and
                  Zeinab Fawaz},
  title        = {An integrated multimedia data reduction and content confidentiality
                  approach for limited networked devices},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {81--97},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.01.007},
  doi          = {10.1016/J.ADHOC.2015.01.007},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/MostefaouiNF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MangiliMP15,
  author       = {Michele Mangili and
                  Fabio Martignon and
                  Stefano Paraboschi},
  title        = {A cache-aware mechanism to enforce confidentiality, trackability and
                  access policy evolution in Content-Centric Networks},
  journal      = {Comput. Networks},
  volume       = {76},
  pages        = {126--145},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2014.11.010},
  doi          = {10.1016/J.COMNET.2014.11.010},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/MangiliMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XieBWLHA15,
  author       = {Mande Xie and
                  Urmila Bhanja and
                  Guiyi Wei and
                  Yun Ling and
                  Mohammad Mehedi Hassan and
                  Atif Alamri},
  title        = {SecNRCC: a loss-tolerant secure network reprogramming with confidentiality
                  consideration for wireless sensor networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {10},
  pages        = {2668--2680},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3277},
  doi          = {10.1002/CPE.3277},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/XieBWLHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TakalkarM15,
  author       = {Vedashree Takalkar and
                  Parikshit N. Mahalle},
  title        = {Confidentiality in Online Social Networks; ATrust-based Approach},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {125--144},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.427},
  doi          = {10.13052/JCSM2245-1439.427},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TakalkarM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/DolatabadiNT15,
  author       = {Amir Hossein Kamali Dolatabadi and
                  Esmaeil Najafi and
                  Mohammad Taghi Taghavifard},
  title        = {A confident supply chain network model using credibility measure under
                  uncertainty condition},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {28},
  number       = {5},
  pages        = {2127--2140},
  year         = {2015},
  url          = {https://doi.org/10.3233/IFS-141493},
  doi          = {10.3233/IFS-141493},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/DolatabadiNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/YasarMK15,
  author       = {Ansar{-}Ul{-}Haque Yasar and
                  Haroon Malik and
                  Zahoor Ali Khan},
  title        = {Mobile Sensor Networks Applications and Confidentiality},
  journal      = {Mob. Inf. Syst.},
  volume       = {2015},
  pages        = {893438:1--893438:2},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/893438},
  doi          = {10.1155/2015/893438},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/YasarMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/see/BourasGGD15,
  author       = {Ahmed Fouad Bouras and
                  Carole Genty and
                  Vincent Guilbert and
                  Mohamed Dadda},
  title        = {Organ Procurement and Social Networks: The End of Confidentiality?},
  journal      = {Sci. Eng. Ethics},
  volume       = {21},
  number       = {4},
  pages        = {837--838},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11948-014-9577-1},
  doi          = {10.1007/S11948-014-9577-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/see/BourasGGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/XuZW15,
  author       = {Huping Xu and
                  Jiajun Zhu and
                  Bang Wang},
  title        = {On the Deployment of a Connected Sensor Network for Confident Information
                  Coverage},
  journal      = {Sensors},
  volume       = {15},
  number       = {5},
  pages        = {11277--11294},
  year         = {2015},
  url          = {https://doi.org/10.3390/s150511277},
  doi          = {10.3390/S150511277},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/XuZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/SarikayaEK15,
  author       = {Yunus Sarikaya and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin and
                  Can Emre Koksal},
  title        = {Confidentiality-Preserving Control of Uplink Cellular Wireless Networks
                  Using Hybrid {ARQ}},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {23},
  number       = {5},
  pages        = {1457--1470},
  year         = {2015},
  url          = {https://doi.org/10.1109/TNET.2014.2331077},
  doi          = {10.1109/TNET.2014.2331077},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/SarikayaEK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/DengWLY15,
  author       = {Xianjun Deng and
                  Bang Wang and
                  Wenyu Liu and
                  Laurence T. Yang},
  title        = {Sensor Scheduling for Multi-Modal Confident Information Coverage in
                  Sensor Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {26},
  number       = {3},
  pages        = {902--913},
  year         = {2015},
  url          = {https://doi.org/10.1109/TPDS.2014.2315193},
  doi          = {10.1109/TPDS.2014.2315193},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/DengWLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeYZY15,
  author       = {Biao He and
                  Nan (Jonas) Yang and
                  Xiangyun Zhou and
                  Jinhong Yuan},
  title        = {Base Station Cooperation for Confidential Broadcasting in Multi-Cell
                  Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {14},
  number       = {10},
  pages        = {5287--5299},
  year         = {2015},
  url          = {https://doi.org/10.1109/TWC.2015.2435745},
  doi          = {10.1109/TWC.2015.2435745},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeYZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SenGBPR15,
  author       = {Arpan Sen and
                  Shrestha Ghosh and
                  Arinjoy Basak and
                  Harsh Parsuram Puria and
                  Sushmita Ruj},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido and
                  Jong Hyuk Park},
  title        = {Achieving Data Survivability and Confidentiality in Unattended Wireless
                  Sensor Networks},
  booktitle    = {29th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27,
                  2015},
  pages        = {239--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AINA.2015.191},
  doi          = {10.1109/AINA.2015.191},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SenGBPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ZhuL15,
  author       = {Minghui Zhu and
                  Yang Lu},
  title        = {On confidentiality preserving monitoring of linear dynamic networks
                  against inference attacks},
  booktitle    = {American Control Conference, {ACC} 2015, Chicago, IL, USA, July 1-3,
                  2015},
  pages        = {359--364},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ACC.2015.7170762},
  doi          = {10.1109/ACC.2015.7170762},
  timestamp    = {Fri, 03 Dec 2021 13:03:59 +0100},
  biburl       = {https://dblp.org/rec/conf/amcc/ZhuL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/Estivill-Castro15,
  author       = {Vladimir Estivill{-}Castro and
                  David F. Nettleton},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Privacy Tips: Would it be ever possible to empower online social-network
                  users to control the confidentiality of their data?},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {1449--1456},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2809279},
  doi          = {10.1145/2808797.2809279},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/Estivill-Castro15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blackseecom/NowosielskiWLW15,
  author       = {Leszek Nowosielski and
                  Radoslaw Wielemborek and
                  Dariusz Laskowski and
                  Marian Wnuk},
  title        = {Confidentiality of data in backbone networks based on scalable and
                  dynamic environment technologies},
  booktitle    = {{IEEE} International Black Sea Conference on Communications and Networking,
                  BlackSeaCom 2015, Constanta, Romania, May 18-21, 2015},
  pages        = {68--71},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/BlackSeaCom.2015.7185088},
  doi          = {10.1109/BLACKSEACOM.2015.7185088},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blackseecom/NowosielskiWLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/depcos/WielemborekLL15,
  author       = {Radoslaw Wielemborek and
                  Dariusz Laskowski and
                  Piotr Lubkowski},
  editor       = {Wojciech Zamojski and
                  Jacek Mazurkiewicz and
                  Jaroslaw Sugier and
                  Tomasz Walkowiak and
                  Janusz Kacprzyk},
  title        = {Effectiveness of Providing Data Confidentiality in Backbone Networks
                  Based on Scalable and Dynamic Environment Technologies},
  booktitle    = {Theory and Engineering of Complex Systems and Dependability - Proceedings
                  of the Tenth International Conference on Dependability and Complex
                  Systems DepCoS-RELCOMEX, June 29 - July 3 2015, Brun{\'{o}}w,
                  Poland},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {365},
  pages        = {523--531},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19216-1\_50},
  doi          = {10.1007/978-3-319-19216-1\_50},
  timestamp    = {Sat, 19 Oct 2019 20:27:57 +0200},
  biburl       = {https://dblp.org/rec/conf/depcos/WielemborekLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/Papazafeiropoulos15,
  author       = {Anastasios K. Papazafeiropoulos and
                  Caijun Zhong},
  title        = {Confidentiality Analysis in Multicast Stochastic {MIMO} Networks with
                  Imperfect {CSIT}},
  booktitle    = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOMW.2015.7414068},
  doi          = {10.1109/GLOCOMW.2015.7414068},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/Papazafeiropoulos15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/LiMS15,
  author       = {Teng Li and
                  Jianfeng Ma and
                  Cong Sun},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {CRVad: Confidential Reasoning and Verification Towards Secure Routing
                  in Ad Hoc Networks},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 15th International
                  Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015.
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9530},
  pages        = {449--462},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27137-8\_33},
  doi          = {10.1007/978-3-319-27137-8\_33},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/LiMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HeYZY15,
  author       = {Biao He and
                  Nan (Jonas) Yang and
                  Xiangyun Zhou and
                  Jinhong Yuan},
  title        = {Confidential broadcasting via coordinated beamforming in two-cell
                  networks},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {7376--7382},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249505},
  doi          = {10.1109/ICC.2015.7249505},
  timestamp    = {Wed, 10 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HeYZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuwb/PfennigFRSJ15,
  author       = {Stefan Pfennig and
                  Elke Franz and
                  Johannes Richter and
                  Christian Scheunert and
                  Eduard A. Jorswieck},
  title        = {Confidential Network Coding: Physical Layer vs. Network Layer},
  booktitle    = {{IEEE} International Conference on Ubiquitous Wireless Broadband,
                  {ICUWB} 2015, Montreal, QC, Canada, October 4-7, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICUWB.2015.7324428},
  doi          = {10.1109/ICUWB.2015.7324428},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuwb/PfennigFRSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/XiongWW15,
  author       = {Zehui Xiong and
                  Bang Wang and
                  Zhongsi Wang},
  title        = {Priority-Based Greedy Scheduling for Confident Information Coverage
                  in Energy Harvesting Wireless Sensor Networks},
  booktitle    = {11th International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2015, Shenzhen, China, December 16-18, 2015},
  pages        = {18--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSN.2015.20},
  doi          = {10.1109/MSN.2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/XiongWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Estivill-Castro15,
  author       = {Vladimir Estivill{-}Castro and
                  David F. Nettleton},
  title        = {Can On-line Social Network Users Trust That What They Designated as
                  Confidential Data Remains So?},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {966--973},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.471},
  doi          = {10.1109/TRUSTCOM.2015.471},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Estivill-Castro15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vdat/GuhaSC15,
  author       = {Krishnendu Guha and
                  Debasri Saha and
                  Amlan Chakrabarti},
  title        = {{RTNA:} Securing {SOC} architectures from confidentiality attacks
                  at runtime using {ART1} neural networks},
  booktitle    = {19th International Symposium on {VLSI} Design and Test, {VDAT} 2015,
                  Ahmedabad, India, June 26-29, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISVDAT.2015.7208048},
  doi          = {10.1109/ISVDAT.2015.7208048},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vdat/GuhaSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NouraC15,
  author       = {Hassan Noura and
                  Damien Courouss{\'{e}}},
  title        = {{HLDCA-WSN:} Homomorphic Lightweight Data Confidentiality Algorithm
                  for Wireless Sensor Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/928},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NouraC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/NovalesMS14,
  author       = {Ramon Novales and
                  Neeraj Mittal and
                  Kamil Sara{\c{c}}},
  title        = {{SKAIT:} {A} parameterized key assignment scheme for confidential
                  communication in resource constrained ad hoc wireless networks},
  journal      = {Ad Hoc Networks},
  volume       = {20},
  pages        = {163--181},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.adhoc.2014.04.006},
  doi          = {10.1016/J.ADHOC.2014.04.006},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/NovalesMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhuYXG14,
  author       = {Liehuang Zhu and
                  Zhen Yang and
                  Jingfeng Xue and
                  Cong Guo},
  title        = {An Efficient Confidentiality and Integrity Preserving Aggregation
                  Protocol in Wireless Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/565480},
  doi          = {10.1155/2014/565480},
  timestamp    = {Wed, 11 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhuYXG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HanHTIJ14,
  author       = {Nguyen Dinh Han and
                  Longzhe Han and
                  Dao Minh Tuan and
                  Hoh Peter In and
                  Minho Jo},
  title        = {A scheme for data confidentiality in Cloud-assisted Wireless Body
                  Area Networks},
  journal      = {Inf. Sci.},
  volume       = {284},
  pages        = {157--166},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.03.126},
  doi          = {10.1016/J.INS.2014.03.126},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HanHTIJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaragataASA14,
  author       = {Daniel Caragata and
                  Safwan El Assad and
                  Charles A. Shoniregun and
                  Galyna A. Akmayeva},
  title        = {Confidential initial identification and other improvements for {UMTS}
                  security},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {3},
  pages        = {558--566},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.757},
  doi          = {10.1002/SEC.757},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaragataASA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanHA14,
  author       = {Haijun Pan and
                  Edwin S. H. Hou and
                  Nirwan Ansari},
  title        = {Enhanced name and vote separated E-voting system: an E-voting system
                  that ensures voter confidentiality and candidate privacy},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2335--2344},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.944},
  doi          = {10.1002/SEC.944},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/YangGYM14,
  author       = {Nan (Jonas) Yang and
                  Giovanni Geraci and
                  Jinhong Yuan and
                  Robert A. Malaney},
  title        = {Confidential Broadcasting via Linear Precoding in Non-Homogeneous
                  {MIMO} Multiuser Networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {62},
  number       = {7},
  pages        = {2515--2530},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCOMM.2014.2329471},
  doi          = {10.1109/TCOMM.2014.2329471},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/YangGYM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/HeCZY14,
  author       = {Daojing He and
                  Sammy Chan and
                  Yan Zhang and
                  Haomiao Yang},
  title        = {Lightweight and Confidential Data Discovery and Dissemination for
                  Wireless Body Area Networks},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {18},
  number       = {2},
  pages        = {440--448},
  year         = {2014},
  url          = {https://doi.org/10.1109/JBHI.2013.2293620},
  doi          = {10.1109/JBHI.2013.2293620},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/HeCZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/KeallyZXNQ14,
  author       = {Matthew Keally and
                  Gang Zhou and
                  Guoliang Xing and
                  David T. Nguyen and
                  Xin Qi},
  title        = {A Learning-Based Approach to Confident Event Detection in Heterogeneous
                  Sensor Networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {11},
  number       = {1},
  pages        = {10:1--10:28},
  year         = {2014},
  url          = {https://doi.org/10.1145/2575788},
  doi          = {10.1145/2575788},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/KeallyZXNQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcai/SanchezD14,
  author       = {Antonio Juan S{\'{a}}nchez and
                  Yves Demazeau},
  editor       = {Sigeru Omatu and
                  Hugues Bersini and
                  Juan M. Corchado Rodr{\'{\i}}guez and
                  Sara Rodr{\'{\i}}guez and
                  Pawel Pawlewski and
                  Edgardo Bucciarelli},
  title        = {The Age of Confidentiality: {A} Review of the Security in Social Networks
                  and Internet},
  booktitle    = {Distributed Computing and Artificial Intelligence, 11th International
                  Conference, {DCAI} 2014, Salamanca, Spain, June 4-6, 2014},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {290},
  pages        = {407--415},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07593-8\_47},
  doi          = {10.1007/978-3-319-07593-8\_47},
  timestamp    = {Tue, 05 Mar 2024 21:11:29 +0100},
  biburl       = {https://dblp.org/rec/conf/dcai/SanchezD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ZhuW14,
  author       = {Jiajun Zhu and
                  Bang Wang},
  title        = {Sensor placement algorithms for confident information coverage in
                  wireless sensor networks},
  booktitle    = {23rd International Conference on Computer Communication and Networks,
                  {ICCCN} 2014, Shanghai, China, August 4-7, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCCN.2014.6911802},
  doi          = {10.1109/ICCCN.2014.6911802},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ZhuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/BruceL14,
  author       = {Bruce Ndibanje and
                  Hoon{-}Jae Lee},
  title        = {Anonymization algorithm for security and confidentiality of health
                  data set across social network},
  booktitle    = {International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2014, Busan, South Korea, October 22-24, 2014},
  pages        = {65--70},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICTC.2014.6983085},
  doi          = {10.1109/ICTC.2014.6983085},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/BruceL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/ZhuW14,
  author       = {Jiajun Zhu and
                  Bang Wang},
  title        = {Placement patterns for confident information coverage in wireless
                  sensor networks},
  booktitle    = {Sixth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2014, Shanghai, China, July 8-11, 2014},
  pages        = {93--98},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICUFN.2014.6876757},
  doi          = {10.1109/ICUFN.2014.6876757},
  timestamp    = {Thu, 28 Jul 2022 14:35:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/ZhuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/Wang14,
  author       = {Huaqun Wang},
  editor       = {Mario Gerla and
                  Khaled Ben Letaief and
                  George C. Hadjichristofi and
                  Christian Callegari},
  title        = {Authentic and confidential policy distribution in software defined
                  wireless network},
  booktitle    = {International Wireless Communications and Mobile Computing Conference,
                  {IWCMC} 2014, Nicosia, Cyprus, August 4-8, 2014},
  pages        = {1167--1171},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IWCMC.2014.6906520},
  doi          = {10.1109/IWCMC.2014.6906520},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/Wang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/BentstuenC14,
  author       = {Ole Ingar Bentstuen and
                  Per Carl{\'{e}}n},
  title        = {Traffic flow confidentiality in federated networks},
  booktitle    = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore,
                  MD, USA, October 6-8, 2014},
  pages        = {74--81},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MILCOM.2014.20},
  doi          = {10.1109/MILCOM.2014.20},
  timestamp    = {Fri, 16 Sep 2022 20:28:33 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/BentstuenC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/SuGYLGBCA14,
  author       = {Lu Su and
                  Yunlong Gao and
                  Fan Ye and
                  Peng Liu and
                  Oktay G{\"{u}}nl{\"{u}}k and
                  Tom Bcrman and
                  Seraphin B. Calo and
                  Tarek F. Abdelzaher},
  title        = {Robust confidentiality preserving data delivery in federated coalition
                  networks},
  booktitle    = {2014 {IFIP} Networking Conference, Trondheim, Norway, June 2-4, 2014},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IFIPNetworking.2014.6857084},
  doi          = {10.1109/IFIPNETWORKING.2014.6857084},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/SuGYLGBCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/ZerrPD14,
  author       = {Sergej Zerr and
                  Odysseas Papapetrou and
                  Elena Demidova},
  editor       = {Luo Si and
                  Hui Yang},
  title        = {{HEALTH+Z:} Confidential Provider Selection in Collaborative Healthcare
                  {P2P} Networks},
  booktitle    = {Proceeding of the 1st International Workshop on Privacy-Preserving
                  {IR:} When Information Retrieval Meets Privacy and Security co-located
                  with 37th Annual International {ACM} {SIGIR} conference, PIR@SIGIR
                  2014, Gold Coast, Australia, July 11, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1225},
  pages        = {1--6},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1225/pir2014\_submission\_5.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:17 +0100},
  biburl       = {https://dblp.org/rec/conf/sigir/ZerrPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/XiongZCL13,
  author       = {Hu Xiong and
                  Guobin Zhu and
                  Zhong Chen and
                  Fagen Li},
  title        = {Efficient communication scheme with confidentiality and privacy for
                  vehicular networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {6},
  pages        = {1717--1725},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2012.11.009},
  doi          = {10.1016/J.COMPELECENG.2012.11.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/XiongZCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TanOZJ13,
  author       = {Hailun Tan and
                  Diethelm Ostry and
                  John Zic and
                  Sanjay K. Jha},
  title        = {A confidential and DoS-resistant multi-hop code dissemination protocol
                  for wireless sensor networks},
  journal      = {Comput. Secur.},
  volume       = {32},
  pages        = {36--55},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.09.012},
  doi          = {10.1016/J.COSE.2012.09.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TanOZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LvL13,
  author       = {Xixiang Lv and
                  Hui Li},
  title        = {Secure group communication with both confidentiality and non-repudiation
                  for mobile ad-hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0314},
  doi          = {10.1049/IET-IFS.2010.0314},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LvL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhuYWL13,
  author       = {Liehuang Zhu and
                  Zhen Yang and
                  Mingzhong Wang and
                  Meng Li},
  title        = {{ID} List Forwarding Free Confidentiality Preserving Data Aggregation
                  for Wireless Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/241261},
  doi          = {10.1155/2013/241261},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhuYWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijndc/RayCA13,
  author       = {Biplob Rakshit Ray and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  title        = {Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery
                  for {RFID} Tag},
  journal      = {Int. J. Networked Distributed Comput.},
  volume       = {1},
  number       = {2},
  pages        = {79--88},
  year         = {2013},
  url          = {https://doi.org/10.2991/ijndc.2013.1.2.2},
  doi          = {10.2991/IJNDC.2013.1.2.2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijndc/RayCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BkakriaCCFG13,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jos{\'{e}} M. Fernandez and
                  David Gross{-}Amblard},
  title        = {Preserving Multi-relational Outsourced Databases Confidentiality using
                  Fragmentation and Encryption},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {39--62},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.039},
  doi          = {10.22667/JOWUA.2013.06.31.039},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  title        = {Double Encryption for Data Authenticity and Integrity in Privacy-
                  preserving Confidential Forensic Investigation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {104--113},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.104},
  doi          = {10.22667/JOWUA.2013.06.31.104},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Fienberg13,
  author       = {Stephen E. Fienberg},
  title        = {Is the Privacy of Network Data an Oxymoron?},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v4i2.619},
  doi          = {10.29012/JPC.V4I2.619},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Fienberg13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/X13,
  title        = {Consumer Data Privacy in a Networked World: {A} Framework for Protecting
                  Privacy and Promoting Innovation in the Global Digital Economy},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.29012/jpc.v4i2.623},
  doi          = {10.29012/JPC.V4I2.623},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/X13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/GharbaouiPGMC13,
  author       = {Molka Gharbaoui and
                  Francesco Paolucci and
                  Alessio Giorgetti and
                  Barbara Martini and
                  Piero Castoldi},
  title        = {Effective Statistical Detection of Smart Confidentiality Attacks in
                  Multi-Domain Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {10},
  number       = {4},
  pages        = {383--397},
  year         = {2013},
  url          = {https://doi.org/10.1109/TNSM.2013.111113.130482},
  doi          = {10.1109/TNSM.2013.111113.130482},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/GharbaouiPGMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/WangDLYC13,
  author       = {Bang Wang and
                  Xianjun Deng and
                  Wenyu Liu and
                  Laurence T. Yang and
                  Han{-}Chieh Chao},
  title        = {Confident information coverage in sensor networks for field reconstruction},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {20},
  number       = {6},
  pages        = {74--81},
  year         = {2013},
  url          = {https://doi.org/10.1109/MWC.2013.6704477},
  doi          = {10.1109/MWC.2013.6704477},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/WangDLYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/DengWLYC13,
  author       = {Xianjun Deng and
                  Bang Wang and
                  Wenyu Liu and
                  Laurence T. Yang and
                  Jiaoyan Chen},
  title        = {Lifetime Maximization for Multi-modal Confident Information Coverage
                  in Sensor Networks},
  booktitle    = {10th {IEEE} International Conference on High Performance Computing
                  and Communications {\&} 2013 {IEEE} International Conference on
                  Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China,
                  November 13-15, 2013},
  pages        = {1173--1178},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HPCC.and.EUC.2013.166},
  doi          = {10.1109/HPCC.AND.EUC.2013.166},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/DengWLYC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ClarkePT13,
  author       = {Charles A. Clarke and
                  Eckhard Pfluegel and
                  Dimitris Tsaptsinos},
  title        = {Enhanced Virtual Private Social Networks: Implementing user content
                  confidentiality},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {306--312},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750212},
  doi          = {10.1109/ICITST.2013.6750212},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ClarkePT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/GharbaouiPGCM13,
  author       = {Molka Gharbaoui and
                  Francesco Paolucci and
                  Alessio Giorgetti and
                  Piero Castoldi and
                  Barbara Martini},
  editor       = {Filip De Turck and
                  Yixin Diao and
                  Choong Seon Hong and
                  Deep Medhi and
                  Ramin Sadre},
  title        = {Guaranteeing confidentiality in multi-domain networks: The {PCE} Anomaly
                  Detector {(PAD)}},
  booktitle    = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
                  {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  pages        = {485--491},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6573022/},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/GharbaouiPGCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/DengWWLM13,
  author       = {Xianjun Deng and
                  Bang Wang and
                  Nuoya Wang and
                  Wenyu Liu and
                  Yijun Mo},
  title        = {Sensor scheduling for confident information coverage in wireless sensor
                  networks},
  booktitle    = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
                  Shanghai, Shanghai, China, April 7-10, 2013},
  pages        = {1027--1031},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCNC.2013.6554705},
  doi          = {10.1109/WCNC.2013.6554705},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/DengWWLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/SarikayaEK13,
  author       = {Yunus Sarikaya and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin and
                  Can Emre Koksal},
  title        = {Dynamic network control for confidential multi-hop communications},
  booktitle    = {11th International Symposium and Workshops on Modeling and Optimization
                  in Mobile, Ad Hoc and Wireless Networks, WiOpt 2013, Tsukuba Science
                  City, Japan, May 13-17, 2013},
  pages        = {272--279},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://dl.ifip.org/db/conf/wiopt/wiopt2013/SarikayaEK13.pdf},
  timestamp    = {Thu, 09 Dec 2021 12:24:09 +0100},
  biburl       = {https://dblp.org/rec/conf/wiopt/SarikayaEK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/PietroG13,
  author       = {Roberto Di Pietro and
                  Stefano Guarino},
  title        = {Confidentiality and availability issues in Mobile Unattended Wireless
                  Sensor Networks},
  booktitle    = {{IEEE} 14th International Symposium on "A World of Wireless, Mobile
                  and Multimedia Networks", WoWMoM 2013, Madrid, Spain, June 4-7, 2013},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WoWMoM.2013.6583467},
  doi          = {10.1109/WOWMOM.2013.6583467},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/PietroG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-1002,
  author       = {Yunus Sarikaya and
                  {\"{O}}zg{\"{u}}r Er{\c{c}}etin and
                  Can Emre Koksal},
  title        = {Dynamic Network Control for Confidential Multi-hop Communications},
  journal      = {CoRR},
  volume       = {abs/1301.1002},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.1002},
  eprinttype    = {arXiv},
  eprint       = {1301.1002},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-1002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/IonRC12,
  author       = {Mihaela Ion and
                  Giovanni Russello and
                  Bruno Crispo},
  title        = {Design and implementation of a confidentiality and access control
                  solution for publish/subscribe systems},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {7},
  pages        = {2014--2037},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2012.02.013},
  doi          = {10.1016/J.COMNET.2012.02.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/IonRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/BistaKSC12,
  author       = {Rabindra Bista and
                  Yong{-}Ki Kim and
                  Myoung{-}Seon Song and
                  Jae{-}Woo Chang},
  title        = {Improving Data Confidentiality and Integrity for Data Aggregation
                  in Wireless Sensor Networks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {1},
  pages        = {67--77},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.67},
  doi          = {10.1587/TRANSINF.E95.D.67},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/BistaKSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YooPK12,
  author       = {Sang Guun Yoo and
                  Keunyoung Park and
                  Juho Kim},
  title        = {Confidential information protection system for mobile devices},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {12},
  pages        = {1452--1461},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.516},
  doi          = {10.1002/SEC.516},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YooPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/PapadopoulosKP12,
  author       = {Stavros Papadopoulos and
                  Aggelos Kiayias and
                  Dimitris Papadias},
  title        = {Exact In-Network Aggregation with Integrity and Confidentiality},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {24},
  number       = {10},
  pages        = {1760--1773},
  year         = {2012},
  url          = {https://doi.org/10.1109/TKDE.2012.64},
  doi          = {10.1109/TKDE.2012.64},
  timestamp    = {Tue, 02 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/PapadopoulosKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WyrembelskiB12,
  author       = {Rafael F. Wyrembelski and
                  Holger Boche},
  title        = {Physical Layer Integration of Private, Common, and Confidential Messages
                  in Bidirectional Relay Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {11},
  number       = {9},
  pages        = {3170--3179},
  year         = {2012},
  url          = {https://doi.org/10.1109/TWC.2012.070912.111293},
  doi          = {10.1109/TWC.2012.070912.111293},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WyrembelskiB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/HuangLCZ12,
  author       = {Jen{-}Fa Huang and
                  Chung{-}Yu Li and
                  Kai{-}Sheng Chen and
                  Tsing Zhang},
  title        = {Structuring Reconfigurable Composite Signature Codecs to Enhance {OCDMA}
                  Network Confidentiality},
  booktitle    = {2012 Seventh International Conference on Broadband, Wireless Computing,
                  Communication and Applications, Victoria, BC, Canada, November 12-14,
                  2012},
  pages        = {440--445},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BWCCA.2012.78},
  doi          = {10.1109/BWCCA.2012.78},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/HuangLCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/IskanderLM12,
  author       = {Marian Kamal Iskander and
                  Adam J. Lee and
                  Daniel Moss{\'{e}}},
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {Confidentiality-preserving and fault-tolerant in-network aggregation
                  for Collaborative WSNs},
  booktitle    = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  pages        = {107--116},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2012.250523},
  doi          = {10.4108/ICST.COLLABORATECOM.2012.250523},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/IskanderLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ht/FahlHMS12,
  author       = {Sascha Fahl and
                  Marian Harbach and
                  Thomas Muders and
                  Matthew Smith},
  editor       = {Ethan V. Munson and
                  Markus Strohmaier},
  title        = {TrustSplit: usable confidentiality for social network messaging},
  booktitle    = {23rd {ACM} Conference on Hypertext and Social Media, {HT} '12, Milwaukee,
                  WI, USA, June 25-28, 2012},
  pages        = {145--154},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2309996.2310022},
  doi          = {10.1145/2309996.2310022},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ht/FahlHMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/BagciPRRV12,
  author       = {Ibrahim Ethem Bagci and
                  Mohammad Reza Pourmirza and
                  Shahid Raza and
                  Utz Roedig and
                  Thiemo Voigt},
  title        = {Codo: confidential data storage for wireless sensor networks},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
                  / Workshops},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6708508},
  doi          = {10.1109/MASS.2012.6708508},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/BagciPRRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KarumanchiSL12,
  author       = {Sushama Karumanchi and
                  Anna Cinzia Squicciarini and
                  Dan Lin},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {445--461},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_34},
  doi          = {10.1007/978-3-642-34601-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KarumanchiSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/0001B12,
  author       = {Johannes Braun and
                  Johannes Buchmann},
  editor       = {Albert Levi and
                  Mohamad Badra and
                  Matteo Cesana and
                  Mona Ghassemian and
                  {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and
                  Nafa{\^{a}} Jabeur and
                  Marek Klonowski and
                  Antonio Ma{\~{n}}a and
                  Susana Sargento and
                  Sherali Zeadally},
  title        = {Perfect Confidentiality Network: {A} Solution for Information Theoretically
                  Secure Key Agreement},
  booktitle    = {5th International Conference on New Technologies, Mobility and Security,
                  Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NTMS.2012.6208676},
  doi          = {10.1109/NTMS.2012.6208676},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/0001B12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/ChangW12,
  author       = {Yao{-}Tang Chang and
                  Chuen{-}Ching Wang},
  editor       = {Bernady O. Apduhan and
                  Ching{-}Hsien Hsu and
                  Tadashi Dohi and
                  Kenji Ishida and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {Confidential Enhancement with Multi-code Keying Reconfiguration over
                  Time-Shifted CHPC-based 2D {OCDMA} Networks},
  booktitle    = {9th International Conference on Ubiquitous Intelligence and Computing
                  and 9th International Conference on Autonomic and Trusted Computing,
                  {UIC/ATC} 2012, Fukuoka, Japan, September 4-7, 2012},
  pages        = {374--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/UIC-ATC.2012.65},
  doi          = {10.1109/UIC-ATC.2012.65},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/ChangW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/HarbachFMS12,
  author       = {Marian Harbach and
                  Sascha Fahl and
                  Thomas Muders and
                  Matthew Smith},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {All our messages are belong to us: usable confidentiality in social
                  networks},
  booktitle    = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon,
                  France, April 16-20, 2012 (Companion Volume)},
  pages        = {519--520},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187980.2188106},
  doi          = {10.1145/2187980.2188106},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/HarbachFMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-1749,
  author       = {Hamza Aldabbas and
                  Tariq Falah Alwada'n and
                  Helge Janicke and
                  Ali H. Al{-}Bayatti},
  title        = {Data Confidentiality in Mobile Ad hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1203.1749},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.1749},
  eprinttype    = {arXiv},
  eprint       = {1203.1749},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-1749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/NovalesM11,
  author       = {Ramon Novales and
                  Neeraj Mittal},
  title        = {Parameterized key assignment for confidential communication in wireless
                  networks},
  journal      = {Ad Hoc Networks},
  volume       = {9},
  number       = {7},
  pages        = {1186--1201},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.adhoc.2011.01.009},
  doi          = {10.1016/J.ADHOC.2011.01.009},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/NovalesM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocnet/PaolucciGGCMVC11,
  author       = {Francesco Paolucci and
                  Molka Gharbaoui and
                  Alessio Giorgetti and
                  Filippo Cugini and
                  Barbara Martini and
                  Luca Valcarenghi and
                  Piero Castoldi},
  title        = {Preserving Confidentiality in PCE-based Multi-domain Networks},
  journal      = {{JOCN}},
  volume       = {3},
  number       = {5},
  pages        = {465--474},
  year         = {2011},
  url          = {https://doi.org/10.1364/jocn.3.000465},
  doi          = {10.1364/JOCN.3.000465},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocnet/PaolucciGGCMVC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShiraishiMF11,
  author       = {Yoshiaki Shiraishi and
                  Masami Mohri and
                  Youji Fukuta},
  title        = {A Server-Aided Computation Protocol Revisited for Confidentiality
                  of Cloud Service},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {2},
  pages        = {83--94},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.06.31.083},
  doi          = {10.22667/JOWUA.2011.06.31.083},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShiraishiMF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/NirmalaM11,
  author       = {M. B. Nirmala and
                  A. S. Manjunath},
  editor       = {David B. Johnson and
                  Anurag Kumar},
  title        = {Confidential Program update with dynamic key computation for clustered
                  wireless sensor networks},
  booktitle    = {Third International Conference on Communication Systems and Networks,
                  {COMSNETS} 2011, Bangalore, India, January 4-8, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMSNETS.2011.5716430},
  doi          = {10.1109/COMSNETS.2011.5716430},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/NirmalaM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WyrembelskiB11,
  author       = {Rafael F. Wyrembelski and
                  Holger Boche},
  title        = {Service integration in multiantenna bidirectional relay networks:
                  Public and confidential messages},
  booktitle    = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM}
                  2011, 5-9 December 2011, Houston, Texas, {USA}},
  pages        = {884--888},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/GLOCOMW.2011.6162583},
  doi          = {10.1109/GLOCOMW.2011.6162583},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WyrembelskiB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/SchiavoniRF11,
  author       = {Valerio Schiavoni and
                  Etienne Rivi{\`{e}}re and
                  Pascal Felber},
  title        = {{WHISPER:} Middleware for Confidential Communication in Large-Scale
                  Networks},
  booktitle    = {2011 International Conference on Distributed Computing Systems, {ICDCS}
                  2011, Minneapolis, Minnesota, USA, June 20-24, 2011},
  pages        = {456--466},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDCS.2011.15},
  doi          = {10.1109/ICDCS.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/SchiavoniRF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icseng/BalasubramanianHZ11,
  author       = {Venki Balasubramanian and
                  Doan B. Hoang and
                  Tanveer A. Zia},
  editor       = {Henry Selvaraj and
                  Dawid Zydek},
  title        = {Addressing the Confidentiality and Integrity of Assistive Care Loop
                  Framework Using Wireless Sensor Networks},
  booktitle    = {21st International Conference on Systems Engineering (ICSEng 2011),
                  Las Vegas, NV, USA, Aug. 16-18, 2011},
  pages        = {416--421},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICSEng.2011.82},
  doi          = {10.1109/ICSENG.2011.82},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icseng/BalasubramanianHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SantosBGBCA11,
  author       = {Carlos Raniery Paula dos Santos and
                  Rafael Santos Bezerra and
                  Lisandro Zambenedetti Granville and
                  Leandro Marcio Bertholdo and
                  Winnie Cheng and
                  Nikos Anerousis},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {A data confidentiality architecture for developing management mashups},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {49--56},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990673},
  doi          = {10.1109/INM.2011.5990673},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/SantosBGBCA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KeallyZXW11,
  author       = {Matthew Keally and
                  Gang Zhou and
                  Guoliang Xing and
                  Jianxin Wu},
  title        = {Exploiting sensing diversity for confident sensing in wireless sensor
                  networks},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {1719--1727},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934969},
  doi          = {10.1109/INFCOM.2011.5934969},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KeallyZXW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/GharbaouiPMCC11,
  author       = {Molka Gharbaoui and
                  Francesco Paolucci and
                  Barbara Martini and
                  Filippo Cugini and
                  Piero Castoldi},
  title        = {Behavior-Based Policies for Preserving Confidentiality in PCE-based
                  Multi-domain {MPLS} Networks},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {81--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.15},
  doi          = {10.1109/POLICY.2011.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/GharbaouiPMCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MajiB11,
  author       = {Amiya Kumar Maji and
                  Saurabh Bagchi},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {v-CAPS: {A} Confidentiality and Anonymity Preserving Routing Protocol
                  for Content-Based Publish-Subscribe Networks},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {281--302},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_16},
  doi          = {10.1007/978-3-642-31909-9\_16},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MajiB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-0345,
  author       = {Yuya Dan},
  title        = {Diffusion of Confidential Information on Networks},
  journal      = {CoRR},
  volume       = {abs/1101.0345},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.0345},
  eprinttype    = {arXiv},
  eprint       = {1101.0345},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-0345.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonRC11,
  author       = {Mihaela Ion and
                  Giovanni Russello and
                  Bruno Crispo},
  title        = {Supporting Publication and Subscription Confidentiality in Pub/Sub
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/OzdemirC10,
  author       = {Suat {\"{O}}zdemir and
                  Hasan Cam},
  title        = {Integration of False Data Detection With Data Aggregation and Confidential
                  Transmission in Wireless Sensor Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {3},
  pages        = {736--749},
  year         = {2010},
  url          = {https://doi.org/10.1109/TNET.2009.2032910},
  doi          = {10.1109/TNET.2009.2032910},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/OzdemirC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/JiangGS10,
  author       = {Wei Jiang and
                  Wensheng Guo and
                  Nan Sang},
  editor       = {Ivan Stojmenovic and
                  Gerald E. Farin and
                  Minyi Guo and
                  Hai Jin and
                  Keqiu Li and
                  Liang Hu and
                  Xiaohui Wei and
                  Xiangjiu Che},
  title        = {Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical
                  System in Wireless Networks},
  booktitle    = {Fifth International Conference on Frontier of Computer Science and
                  Technology, {FCST} 2010, Changchun, Jilin Province, China, August
                  18-22, 2010},
  pages        = {355--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FCST.2010.117},
  doi          = {10.1109/FCST.2010.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcst/JiangGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZouC10,
  author       = {Chao Zou and
                  Chunxiao Chigan},
  title        = {Dynamic Spectrum Allocation Based Confidentiality for Cognitive Radio
                  Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684027},
  doi          = {10.1109/GLOCOM.2010.5684027},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZouC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/FrikkenZ10,
  author       = {Keith B. Frikken and
                  Yihua Zhang},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Sum Aggregation in Sensor Networks While Preserving Confidentiality
                  and Integrity},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_11},
  doi          = {10.1007/978-3-642-25206-8\_11},
  timestamp    = {Sat, 19 Oct 2019 20:35:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/FrikkenZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtas/KeallyZX10,
  author       = {Matthew Keally and
                  Gang Zhou and
                  Guoliang Xing},
  editor       = {Marco Caccamo},
  title        = {Watchdog: Confident Event Detection in Heterogeneous Sensor Networks},
  booktitle    = {16th {IEEE} Real-Time and Embedded Technology and Applications Symposium,
                  {RTAS} 2010, Stockholm, Sweden, April 12-15, 2010},
  pages        = {279--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/RTAS.2010.15},
  doi          = {10.1109/RTAS.2010.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtas/KeallyZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FrikkenZ10,
  author       = {Keith B. Frikken and
                  Yihua Zhang},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Confidentiality and Integrity for {SUM} Aggregation in Sensor Networks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {231--240},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/FrikkenZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/IonRC10,
  author       = {Mihaela Ion and
                  Giovanni Russello and
                  Bruno Crispo},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Supporting Publication and Subscription Confidentiality in Pub/Sub
                  Networks},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_16},
  doi          = {10.1007/978-3-642-16161-2\_16},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/IonRC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Pimenidis2009,
  author       = {Kyriakos Alexis Pimenidis},
  title        = {Holistic confidentiality in open networks},
  school       = {{RWTH} Aachen University, Germany},
  year         = {2009},
  url          = {http://darwin.bth.rwth-aachen.de/opus3/volltexte/2009/2697/},
  urn          = {urn:nbn:de:hbz:82-opus-26970},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Pimenidis2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhangGHZC09,
  author       = {Yuanyuan Zhang and
                  Dawu Gu and
                  Fangyong Hou and
                  Mengqi Zeng and
                  Tao Cheng},
  title        = {Architecture Support for Memory Confidentiality and Integrity in Embedded
                  Systems},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {5},
  number       = {1},
  pages        = {96},
  year         = {2009},
  url          = {https://doi.org/10.1080/15501320802575161},
  doi          = {10.1080/15501320802575161},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhangGHZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitn/ZhengHLT09,
  author       = {Qunwei Zheng and
                  Xiaoyan Hong and
                  Jun Liu and
                  Lei Tang},
  title        = {Time-Based Confidentiality Enhancement Scheme for Mobile Wireless
                  Networks},
  journal      = {Int. J. Interdiscip. Telecommun. Netw.},
  volume       = {1},
  number       = {1},
  pages        = {80--94},
  year         = {2009},
  url          = {https://doi.org/10.4018/jitn.2009010106},
  doi          = {10.4018/JITN.2009010106},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitn/ZhengHLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PietroMM09,
  author       = {Roberto Di Pietro and
                  Pietro Michiardi and
                  Refik Molva},
  title        = {Confidentiality and integrity for data aggregation in {WSN} using
                  peer monitoring},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {2},
  pages        = {181--194},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.93},
  doi          = {10.1002/SEC.93},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PietroMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/DefrawyST09,
  author       = {Karim M. El Defrawy and
                  John Solis and
                  Gene Tsudik},
  editor       = {Sheikh Iqbal Ahamed and
                  Elisa Bertino and
                  Carl K. Chang and
                  Vladimir Getov and
                  Lin Liu and
                  Ming Hua and
                  Rajesh Subramanyan},
  title        = {Leveraging Social Contacts for Message Confidentiality in Delay Tolerant
                  Networks},
  booktitle    = {Proceedings of the 33rd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
                  USA, July 20-24, 2009. Volume 1},
  pages        = {271--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/COMPSAC.2009.43},
  doi          = {10.1109/COMPSAC.2009.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/DefrawyST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/ZengPMM09,
  author       = {Yong Zeng and
                  Qinqi Pei and
                  Jianfeng Ma and
                  Sang{-}Jae Moon},
  title        = {Multi-path Protocol for High Data Confidentiality and Reliability
                  in Wireless Sensor Networks Using Non-dominated Dynamic Compensation},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.86},
  doi          = {10.1109/I-SPAN.2009.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispan/ZengPMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/WangLWG09,
  author       = {Xiaoyuan Wang and
                  Xinfeng Li and
                  Zhiguo Wan and
                  Ming Gu},
  title        = {{CLEAR:} {A} confidential and Lifetime-Aware Routing Protocol for
                  wireless sensor network},
  booktitle    = {Proceedings of the {IEEE} 20th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2009, 13-16 September
                  2009, Tokyo, Japan},
  pages        = {2265--2269},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/PIMRC.2009.5450077},
  doi          = {10.1109/PIMRC.2009.5450077},
  timestamp    = {Fri, 28 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/WangLWG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/NovalesM09,
  author       = {Ramon Novales and
                  Neeraj Mittal},
  title        = {{TASK:} Template-Based Key Assignment for Confidential Communication
                  in Wireless Networks},
  booktitle    = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
                  Niagara Falls, New York, USA, September 27-30, 2009},
  pages        = {209--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SRDS.2009.30},
  doi          = {10.1109/SRDS.2009.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/NovalesM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TanOZJ09,
  author       = {Hailun Tan and
                  Diethelm Ostry and
                  John Zic and
                  Sanjay K. Jha},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {A confidential and DoS-resistant multi-hop code dissemination protocol
                  for wireless sensor networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {245--252},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514308},
  doi          = {10.1145/1514274.1514308},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/TanOZJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-0954,
  author       = {Samir B. Patel and
                  Shrikant N. Pradhan},
  title        = {An approach to secure highly confidential documents of any size in
                  the corporate or institutes having unsecured networks},
  journal      = {CoRR},
  volume       = {abs/0912.0954},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.0954},
  eprinttype    = {arXiv},
  eprint       = {0912.0954},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-0954.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PaiBWMRSM08,
  author       = {Sameer Pai and
                  Sergio A. Bermudez and
                  Stephen B. Wicker and
                  Marci Meingast and
                  Tanya G. Roosta and
                  Shankar Sastry and
                  Deirdre K. Mulligan},
  title        = {Transactional Confidentiality in Sensor Networks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {4},
  pages        = {28--35},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.107},
  doi          = {10.1109/MSP.2008.107},
  timestamp    = {Tue, 07 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PaiBWMRSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/LuoPH08,
  author       = {Jun Luo and
                  Panagiotis Papadimitratos and
                  Jean{-}Pierre Hubaux},
  title        = {GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic
                  Adversaries},
  booktitle    = {Proceedings of the Fifth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2008,
                  June 16-20, 2008, Crowne Plaza, San Francisco International Airport,
                  California, {USA}},
  pages        = {441--450},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/SAHCN.2008.60},
  doi          = {10.1109/SAHCN.2008.60},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/LuoPH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0808-2591,
  author       = {Jun Luo and
                  Panos Papadimitratos and
                  Jean{-}Pierre Hubaux},
  title        = {GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic
                  Adversaries},
  journal      = {CoRR},
  volume       = {abs/0808.2591},
  year         = {2008},
  url          = {http://arxiv.org/abs/0808.2591},
  eprinttype    = {arXiv},
  eprint       = {0808.2591},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0808-2591.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SloaneLS07,
  author       = {Elliot Sloane and
                  Gondy Leroy and
                  Steven D. Sheetz},
  editor       = {John A. Hoxmeier and
                  Stephen C. Hayne},
  title        = {An Integrated Social Actor and Service Oriented Architecture {(SOA)}
                  Approach for Improved Electronic Health Record {(EHR)} Privacy and
                  Confidentiality in the {US} National Healthcare Information Network
                  {(NHIN)}},
  booktitle    = {Reaching New Heights. 13th Americas Conference on Information Systems,
                  {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages        = {366},
  publisher    = {Association for Information Systems},
  year         = {2007},
  url          = {http://aisel.aisnet.org/amcis2007/366},
  timestamp    = {Thu, 26 Nov 2020 16:35:40 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/SloaneLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecumn/SattarzadehAJ07,
  author       = {Behnam Sattarzadeh and
                  Mahdi Asadpour and
                  Rasool Jalili},
  title        = {Improved User Identity Confidentiality for {UMTS} Mobile Networks},
  booktitle    = {Fourth European Conference on Universal Multiservice Networks {(ECUMN}
                  2007), 14-16 February 2007, Toulouse, France},
  pages        = {401--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ECUMN.2007.27},
  doi          = {10.1109/ECUMN.2007.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecumn/SattarzadehAJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LuhK07a,
  author       = {William Luh and
                  Deepa Kundur},
  title        = {Separate Enciphering of Correlated Messages for Confidentiality in
                  Distributed Networks},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {1637--1641},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.315},
  doi          = {10.1109/GLOCOM.2007.315},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LuhK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/RachediBGA07,
  author       = {Abderrezak Rachedi and
                  Abderrahim Benslimane and
                  Lei Guang and
                  Chadi Assi},
  title        = {A Confident Community to Secure Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {1254--1259},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.212},
  doi          = {10.1109/ICC.2007.212},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/RachediBGA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ShaheenOSJ07,
  author       = {Jaleel Shaheen and
                  Diethelm Ostry and
                  Vijay Sivaraman and
                  Sanjay K. Jha},
  title        = {Confidential and Secure Broadcast in Wireless Sensor Networks},
  booktitle    = {Proceedings of the {IEEE} 18th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
                  2007, Athens, Greece},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/PIMRC.2007.4394560},
  doi          = {10.1109/PIMRC.2007.4394560},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/ShaheenOSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/PietroMM06,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei},
  title        = {Energy efficient node-to-node authentication and communication confidentiality
                  in wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {12},
  number       = {6},
  pages        = {709--721},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11276-006-6530-5},
  doi          = {10.1007/S11276-006-6530-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/PietroMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnis/WangA06,
  author       = {Bei Wang and
                  Jim Alves{-}Foss},
  editor       = {Sanguthevar Rajasekaran},
  title        = {An {MSLS-EMM} for enforcing confidentiality in malicious environments},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communication,
                  Network, and Information Security, October 9-11, 2006, Cambridge,
                  MA, {USA}},
  pages        = {126--131},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2006},
  timestamp    = {Fri, 26 Jan 2007 13:40:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cnis/WangA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/SorgeZ06,
  author       = {Christoph Sorge and
                  Martina Zitterbart},
  editor       = {Ketil St{\o}len and
                  William H. Winsborough and
                  Fabio Martinelli and
                  Fabio Massacci},
  title        = {A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer
                  Networks},
  booktitle    = {Trust Management, 4th International Conference, iTrust 2006, Pisa,
                  Italy, May 16-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3986},
  pages        = {367--381},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11755593\_27},
  doi          = {10.1007/11755593\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/SorgeZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/WanZDBA05,
  author       = {Zhiguo Wan and
                  Bo Zhu and
                  Robert H. Deng and
                  Feng Bao and
                  Akkihebbal L. Ananda},
  title        = {DoS-resistant access control protocol with identity confidentiality
                  for wireless networks},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
                  March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages        = {1521--1526},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WCNC.2005.1424740},
  doi          = {10.1109/WCNC.2005.1424740},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/WanZDBA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/join/ChangH04,
  author       = {Chin{-}Chen Chang and
                  Ren{-}Junn Hwang},
  title        = {A new scheme to protect confidential images},
  journal      = {J. Interconnect. Networks},
  volume       = {5},
  number       = {3},
  pages        = {221--232},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0219265904001131},
  doi          = {10.1142/S0219265904001131},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/join/ChangH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LouLF04,
  author       = {Wenjing Lou and
                  Wei Liu and
                  Yuguang Fang},
  title        = {{SPREAD:} Enhancing Data Confidentiality in Mobile Ad Hoc Networks},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, Hong Kong, China,
                  March 7-11, 2004},
  pages        = {2404--2413},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/INFCOM.2004.1354662},
  doi          = {10.1109/INFCOM.2004.1354662},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LouLF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmns/ReasonM01,
  author       = {Johnathan M. Reason and
                  David G. Messerschmitt},
  editor       = {Ehab S. Al{-}Shaer and
                  Giovanni Pacifici},
  title        = {The Impact of Confidentiality on Quality of Service in Heterogeneous
                  Voice over {IP} Networks},
  booktitle    = {Management of Multimedia on the Internet, 4th {IFIP/IEEE} International
                  Conference on Management of Multimedia Networks and Services, {MMNS}
                  2001, Chicago, IL, {USA} October 29 - November 1, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2216},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45508-6\_13},
  doi          = {10.1007/3-540-45508-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mmns/ReasonM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/MoehrM98,
  author       = {Jochen R. Moehr and
                  James G. McDaniel},
  title        = {Adoption of security and confidentiality features in an operational
                  community health information network: the Comox Valley experience
                  - case example},
  journal      = {Int. J. Medical Informatics},
  volume       = {49},
  number       = {1},
  pages        = {81--87},
  year         = {1998},
  url          = {https://doi.org/10.1016/S1386-5056(98)00014-8},
  doi          = {10.1016/S1386-5056(98)00014-8},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/MoehrM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/syben/KoulourisK98,
  author       = {J. Koulouris and
                  A. Koulouris},
  editor       = {Stephan Fischer and
                  Ralf Steinmetz and
                  Heinrich J. St{\"{u}}ttgen and
                  Harmen R. van As and
                  Roberto Vercelli},
  title        = {Securing confidentiality in {PON} and {HFC} networks},
  booktitle    = {Broadband European Networks and Multimedia Services, {SYBEN} 1998,
                  Zurich, Switzerland, May 19-20, 1998},
  series       = {{SPIE} Proceedings},
  volume       = {3408},
  pages        = {148--158},
  publisher    = {{SPIE}},
  year         = {1998},
  url          = {https://doi.org/10.1117/12.321880},
  doi          = {10.1117/12.321880},
  timestamp    = {Sat, 07 Sep 2019 11:59:23 +0200},
  biburl       = {https://dblp.org/rec/conf/syben/KoulourisK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/BowenKRB97,
  author       = {J. W. Bowen and
                  J. C. Klimczak and
                  M. Ruiz and
                  M. Barnes},
  title        = {Design of access control methods for protecting the confidentiality
                  of patient information in networked systems},
  booktitle    = {{AMIA} 1997, American Medical Informatics Association Annual Symposium,
                  Nashville, TN, USA, October 25-29, 1997},
  publisher    = {{AMIA}},
  year         = {1997},
  url          = {https://knowledge.amia.org/amia-55142-a1997a-1.585351/t-001-1.587519/f-001-1.587520/a-009-1.587989/a-010-1.587986},
  timestamp    = {Wed, 17 Apr 2024 11:48:58 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/BowenKRB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics