Surveys the various families of approaches to secure aggregation in distributed networks such as sensor networks. In its selection of covered literature, this book sets out to provide the reader with a general intuitive understanding of the field, rather than to bring the reader exhaustively up to date with all algorithms for the area.