-
1
-
-
84877991654
-
Evading cellular data monitoring with human movement networks
-
A. Aviv, M. Sherr, M. Blaze, J. Smith, Evading cellular data monitoring with human movement networks, in: USENIX Workshop on Hot Topics in Security (HotSec), 2010, pp. 1-6.
-
(2010)
USENIX Workshop on Hot Topics in Security (HotSec)
, pp. 1-6
-
-
Aviv, A.1
Sherr, M.2
Blaze, M.3
Smith, J.4
-
2
-
-
51549104043
-
Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: The case of a gas refinery
-
A. Azadeh, I.M. Fam, M. Khoshnoud, and M. Nikafrouz Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery Elsevier Inf. Sci. 178 22 2008 4280 4300
-
(2008)
Elsevier Inf. Sci.
, vol.178
, Issue.22
, pp. 4280-4300
-
-
Azadeh, A.1
Fam, I.M.2
Khoshnoud, M.3
Nikafrouz, M.4
-
3
-
-
84857178198
-
ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
-
M. Barua, X. Liang, R. Lu, and X. Shen ESPAC: enabling security and patient-centric access control for ehealth in cloud computing Int. J. Secur. Networks 6 2/3 2011 67 76
-
(2011)
Int. J. Secur. Networks
, vol.6
, Issue.2-3
, pp. 67-76
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
6
-
-
0010402853
-
Identity based encryption from the weil pairing
-
D. Boneh, and M. Franklin Identity based encryption from the weil pairing IACR Cryptol. ePrint Arch. 2001 2001 90
-
(2001)
IACR Cryptol. EPrint Arch.
, vol.2001
, pp. 90
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84870064696
-
A store-carry-process-and-forward paradigm for intelligent sensor grids
-
C. Borrego, and S. Robles A store-carry-process-and-forward paradigm for intelligent sensor grids Elsevier Inf. Sci. 222 2013 113 125
-
(2013)
Elsevier Inf. Sci.
, vol.222
, pp. 113-125
-
-
Borrego, C.1
Robles, S.2
-
8
-
-
77951744591
-
Cloud computing architectures for the underserved: Public health cyberinfrastructures through a network of healthATMs
-
N. Botts, B. Thoms, A. Noamani, T. Horan, Cloud computing architectures for the underserved: public health cyberinfrastructures through a network of healthATMs, in: Proc. of HICSS, 2010, pp. 1-10.
-
(2010)
Proc. of HICSS
, pp. 1-10
-
-
Botts, N.1
Thoms, B.2
Noamani, A.3
Horan, T.4
-
9
-
-
84860860165
-
Toward ubiquitous mobility solutions for body sensor networks on healthcare
-
J. Caldeira, J. Rodrigues, and P. Lorenz Toward ubiquitous mobility solutions for body sensor networks on healthcare IEEE Commun. Mag. 50 5 2012 108 115
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.5
, pp. 108-115
-
-
Caldeira, J.1
Rodrigues, J.2
Lorenz, P.3
-
10
-
-
84865833574
-
Privacy-preserving stream aggregation with fault tolerance
-
T. Chan, E. Shi, and D. Song Privacy-preserving stream aggregation with fault tolerance IACR Cryptol. ePrint Arch. 2011 2011 655
-
(2011)
IACR Cryptol. EPrint Arch.
, vol.2011
, pp. 655
-
-
Chan, T.1
Shi, E.2
Song, D.3
-
11
-
-
74049097109
-
On non-cooperative location privacy: A game-theoretic analysis
-
J. Freudigery, M. Manshaeiy, J. Hubauxy, D. Parkes, On non-cooperative location privacy: a game-theoretic analysis, in: Proc. of CCS, 2009, pp. 324-337.
-
(2009)
Proc. of CCS
, pp. 324-337
-
-
Freudigery, J.1
Manshaeiy, M.2
Hubauxy, J.3
Parkes, D.4
-
12
-
-
79956315983
-
PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks
-
X. Liang, R. Lu, L. Chen, X. Lin, and X. Shen PEC: a privacy-preserving emergency call scheme for mobile healthcare social networks J. Commun. Networks 13 2 2011 102 112
-
(2011)
J. Commun. Networks
, vol.13
, Issue.2
, pp. 102-112
-
-
Liang, X.1
Lu, R.2
Chen, L.3
Lin, X.4
Shen, X.5
-
13
-
-
79960616186
-
HealthKiosk: A family-based connected healthcare system for long-term monitoring
-
C. Liu, J. Wen, Q. Yu, B. Yang, W. Wang, HealthKiosk: a family-based connected healthcare system for long-term monitoring, in: Proc. of IEEE Infocom, 2011, pp. 241-246.
-
(2011)
Proc. of IEEE Infocom
, pp. 241-246
-
-
Liu, C.1
Wen, J.2
Yu, Q.3
Yang, B.4
Wang, W.5
-
14
-
-
84864583229
-
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications IEEE Trans. Parallel Distrib. Syst. 23 9 2012 1621 1631
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
15
-
-
77953313061
-
SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
R. Lu, X. Lin, X. Shen, SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in: Proc. of IEEE INFOCOM, 2010, pp. 632-640.
-
(2010)
Proc. of IEEE INFOCOM
, pp. 632-640
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
16
-
-
84915742075
-
Qos-guaranteed bandwidth shifting and redistribution in mobile cloud environment
-
(in press)
-
S. Misra, S. Das, M. Khatua, M. Obaidat, Qos-guaranteed bandwidth shifting and redistribution in mobile cloud environment, IEEE Trans. Cloud Comput. (in press).
-
IEEE Trans. Cloud Comput.
-
-
Misra, S.1
Das, S.2
Khatua, M.3
Obaidat, M.4
-
17
-
-
77549086505
-
A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks
-
S. Misra, and P. Dias A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks J. Syst. Softw. 83 5 2010 852 860
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.5
, pp. 852-860
-
-
Misra, S.1
Dias, P.2
-
18
-
-
84860843712
-
KNOWME: A case study in wireless body area sensor network design
-
U. Mitra, B. Emken, S. Lee, M. Li, V. Rozgic, G. Thatte, H. Vathsangam, D. Zois, M. Annavaram, S. Narayanan, M. Levorato, D. Spruijt-Metz, and G. Sukhatme KNOWME: a case study in wireless body area sensor network design IEEE Commun. Mag. 50 5 2012 116 125
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.5
, pp. 116-125
-
-
Mitra, U.1
Emken, B.2
Lee, S.3
Li, M.4
Rozgic, V.5
Thatte, G.6
Vathsangam, H.7
Zois, D.8
Annavaram, M.9
Narayanan, S.10
Levorato, M.11
Spruijt-Metz, D.12
Sukhatme, G.13
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Proc. of EUROCRYPT, 1999, pp. 223-238.
-
(1999)
Proc. of EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
77955106876
-
-
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, A. Chaintreau, CRAWDAD trace cambridge/haggle/imote/infocom (v. 2006-01-31).
-
CRAWDAD Trace Cambridge/haggle/imote/infocom (V. 2006-01-31)
-
-
Scott, J.1
Gass, R.2
Crowcroft, J.3
Hui, P.4
Diot, C.5
Chaintreau, A.6
-
21
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T. Chan, E. Rieffel, R. Chow, D. Song, Privacy-preserving aggregation of time-series data, in: Proc. NDSS, 2011.
-
(2011)
Proc. NDSS
-
-
Shi, E.1
Chan, T.2
Rieffel, E.3
Chow, R.4
Song, D.5
-
22
-
-
77953308558
-
PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems
-
J. Shi, R. Zhang, Y. Liu, Y. Zhang, PriSense: privacy-preserving data aggregation in people-centric urban sensing systems, in: Proc. IEEE Infocom, 2010, pp. 758-766.
-
(2010)
Proc. IEEE Infocom
, pp. 758-766
-
-
Shi, J.1
Zhang, R.2
Liu, Y.3
Zhang, Y.4
-
23
-
-
84861627279
-
Di-Sec: A distributed security framework for heterogeneous wireless sensor networks
-
M. Valero, S. Jung, A. Uluagac, Y. Li, R. Beyah, Di-Sec: a distributed security framework for heterogeneous wireless sensor networks, in: Proc. of IEEE Infocom, 2012, pp. 585-593.
-
(2012)
Proc. of IEEE Infocom
, pp. 585-593
-
-
Valero, M.1
Jung, S.2
Uluagac, A.3
Li, Y.4
Beyah, R.5
-
24
-
-
84860851274
-
Research challenges in computation, communication, and context awareness for ubiquitous healthcare
-
H. Viswanathan, B. Chen, and D. Pompili Research challenges in computation, communication, and context awareness for ubiquitous healthcare IEEE Commun. Mag. 50 5 2012 92 99
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.5
, pp. 92-99
-
-
Viswanathan, H.1
Chen, B.2
Pompili, D.3
-
25
-
-
79957515932
-
Discrete logarithm based additively homomorphic encryption and secure data aggregation
-
L. Wang, L. Wang, Y. Pan, Z. Zhang, and Y. Yang Discrete logarithm based additively homomorphic encryption and secure data aggregation Elsevier Inf. Sci. 181 16 2011 3308 3322
-
(2011)
Elsevier Inf. Sci.
, vol.181
, Issue.16
, pp. 3308-3322
-
-
Wang, L.1
Wang, L.2
Pan, Y.3
Zhang, Z.4
Yang, Y.5
-
26
-
-
84866358268
-
On prioritized multiple-criteria aggregation
-
R. Yager On prioritized multiple-criteria aggregation IEEE Trans. Syst. Man Cybern. Part B: Cybern. 42 5 2012 1297 1305
-
(2012)
IEEE Trans. Syst. Man Cybern. Part B: Cybern.
, vol.42
, Issue.5
, pp. 1297-1305
-
-
Yager, R.1
-
27
-
-
84896982446
-
Exploiting multimedia services in mobile social network from security and privacy perspectives
-
K. Zhang, X. Liang, R. Lu, and X. Shen Exploiting multimedia services in mobile social network from security and privacy perspectives IEEE Commun. Mag. 52 3 2014 58 65
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.3
, pp. 58-65
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
28
-
-
84877638875
-
VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver location privacy in MSNs
-
K. Zhang, X. Liang, R. Lu, X. Shen, H. Zhao, VSLP: voronoi-socialspot- aided packet forwarding protocol with receiver location privacy in MSNs, in: Proc. of GLOBECOM, 2012, pp. 348-353.
-
(2012)
Proc. of GLOBECOM
, pp. 348-353
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
Zhao, H.5
|