@article{cormode_srivastava_yu_zhang_2010, title={Anonymizing bipartite graph data using safe groupings}, volume={19}, ISSN={["0949-877X"]}, DOI={10.1007/s00778-009-0167-9}, number={1}, journal={VLDB JOURNAL}, author={Cormode, Graham and Srivastava, Divesh and Yu, Ting and Zhang, Qing}, year={2010}, month={Feb}, pages={115–139} } @article{zhang_yu_ning_2008, title={A framework for identifying compromised nodes in wireless sensor networks}, volume={11}, ISSN={["1557-7406"]}, DOI={10.1145/1341731.1341733}, abstractNote={Sensor networks are often subject to physical attacks. Once a node's cryptographic key is compromised, an attacker may completely impersonate it and introduce arbitrary false information into the network. Basic cryptographic mechanisms are often not effective in this situation. Most techniques to address this problem focus on detecting and tolerating false information introduced by compromised nodes. They cannot pinpoint exactly where the false information is introduced and who is responsible for it.}, number={3}, journal={ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY}, author={Zhang, Qing and Yu, Ting and Ning, Peng}, year={2008}, month={Mar} }