-
1
-
-
80053502277
-
Cognitive radio based hierarchical communications infrastructure for smart grid
-
R. Yu, Y. Zhang, S. Gjessing, C. Yuen, S. Xie, and M. Guizani, "Cognitive radio based hierarchical communications infrastructure for smart grid", IEEE Network, vol. 25, no. 5, pp. 6-14, 2011.
-
(2011)
IEEE Network
, vol.25
, Issue.5
, pp. 6-14
-
-
Yu, R.1
Zhang, Y.2
Gjessing, S.3
Yuen, C.4
Xie, S.5
Guizani, M.6
-
2
-
-
84894047012
-
SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing
-
M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, "SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing", Security and Communication Networks, vol. 7, no. 1, pp. 234-244, 2013.
-
(2013)
Security and Communication Networks
, vol.7
, Issue.1
, pp. 234-244
-
-
Wen, M.1
Lu, R.2
Lei, J.3
Li, H.4
Liang, X.5
Shen, X.6
-
3
-
-
84883788980
-
Big data, Hadoop and cloud computing in genomics
-
ODriscoll, Aisling and Daugelaite, Jurate and Sleator, Roy D,"Big data, Hadoop and cloud computing in genomics",Journal of biomedical informatics, vol. 46, no.5, pp.774-781, 2013.
-
(2013)
Journal of Biomedical Informatics
, vol.46
, Issue.5
, pp. 774-781
-
-
Aisling, O.1
Jurate, D.2
Sleator Roy, D.3
-
4
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Mar
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing", in Proceeding of IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proceeding of IEEE INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
5
-
-
84897015477
-
Engineering a Distributed Infrastructure for Large-Scale Cost-Effective Content Dissemination over Urban Vehicular Networks
-
to appear
-
T. H. Luan, X. C. Lin, J. M. Chen, X. Shen, and F. Bai, "Engineering a Distributed Infrastructure for Large-Scale Cost-Effective Content Dissemination over Urban Vehicular Networks", IEEE Transaction on Vehicular Technology, to appear,2014.
-
(2014)
IEEE Transaction on Vehicular Technology
-
-
Luan, T.H.1
Lin, X.C.2
Chen, J.M.3
Shen, X.4
Bai, F.5
-
6
-
-
84916638740
-
A secure data deduplication scheme for cloud storage
-
J. Stanek, A. Sorniotti, E. Androulaki, L. Kencl, "A secure data deduplication scheme for cloud storage", in Book of Financial Cryptography and Data Security, pp.99-118, 2014.
-
(2014)
Book of Financial Cryptography and Data Security
, pp. 99-118
-
-
Stanek, J.1
Sorniotti, A.2
Androulaki, E.3
Kencl, L.4
-
7
-
-
0036373715
-
Reclaiming Space from Duplicate Files in a Serverless Distributed File System
-
J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, and M. Theimer, "Reclaiming Space from Duplicate Files in a Serverless Distributed File System", in Proceeding of ICDCS 2002, pp. 617-624.
-
(2002)
Proceeding of ICDCS
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
8
-
-
84901032811
-
Secure Deduplication with Efficient and Reliable Convergent Key Management
-
J.Li and X.F.Chen, and F.Xhafa and L.Barolli, "Secure Deduplication with Efficient and Reliable Convergent Key Management", IEEE Trans. on Parallel and Distributed Systems, vol.25, no.6, pp.1615-1625, 2014.
-
(2014)
IEEE Trans. on Parallel and Distributed Systems
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.F.2
Xhafa, F.3
Barolli, L.4
-
9
-
-
84883391608
-
Message-Locked Encryption and Secure Deduplication
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-Locked Encryption and Secure Deduplication", Advances in Cryptology-EUROCRYPT 2013, pp.296-312, 2013.
-
(2013)
Advances in Cryptology-EUROCRYPT
, vol.2013
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
10
-
-
84922468481
-
Block-level De-duplication with Encrypted Data
-
P.Puzio, R.Molva, M.Onen, S.Loureiro, "Block-level De-duplication with Encrypted Data", in Open Journal of Cloud Computing (OJCC), vol.1, no.1, pp.10-18, 2014.
-
(2014)
Open Journal of Cloud Computing (OJCC)
, vol.1
, Issue.1
, pp. 10-18
-
-
Puzio, P.1
Molva, R.2
Onen, M.3
Loureiro, S.4
-
11
-
-
84874458079
-
Fast and Secure Laptop Backups with Encrypted De-Duplication
-
P.Anderson and L. Zhang, "Fast and Secure Laptop Backups with Encrypted De-Duplication", in Proceeding of USENIX LISA 2010, pp.1-8.
-
(2010)
Proceeding of USENIX LISA
, pp. 1-8
-
-
Anderson, P.1
Zhang, L.2
-
12
-
-
84961718586
-
PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid
-
M.Wen, and R. Lu, and K. Zhang, and J. Lei, and X. Liang, and X. Shen, "PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid", IEEE Transactions on Emerging Topics in Computing, Vol. 1, No. 1, pp. 178-191, 2013.
-
(2013)
IEEE Transactions on Emerging Topics in Computing
, vol.1
, Issue.1
, pp. 178-191
-
-
Wen, M.1
Lu, R.2
Zhang, K.3
Lei, J.4
Liang, X.5
Shen, X.6
-
13
-
-
84903828007
-
Secure Deduplication Storage Systems with Keyword Search
-
J. Li, X. F. Chen, F. Xhafa, L. Barolli, "Secure Deduplication Storage Systems with Keyword Search", in Proceeding of AINA 2014, pp. 971-977.
-
(2014)
Proceeding of AINA
, pp. 971-977
-
-
Li, J.1
Chen, X.F.2
Xhafa, F.3
Barolli, L.4
-
16
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
B. Zhang, F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search", Journal of Network and Computer Applications, vol.34, no.1, pp.262-267, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.2
|