-
1
-
-
82055164419
-
Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces
-
IEEE
-
S. S. Kanhere, "Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces," in Mobile Data Management (MDM), 2011 12th IEEE International Conference on, vol. 2. IEEE, 2011, pp. 3-6.
-
(2011)
Mobile Data Management (MDM), 2011 12th IEEE International Conference on
, vol.2
, pp. 3-6
-
-
Kanhere, S.S.1
-
2
-
-
84904437867
-
Privacy-preserving highquality map generation with participatory sensing
-
X. Chen, X. Wu, X.-Y. Li, Y. He, and Y. Liu, "Privacy-preserving highquality map generation with participatory sensing," in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 2310-2318.
-
(2014)
INFOCOM, 2014 Proceedings IEEE. IEEE
, pp. 2310-2318
-
-
Chen, X.1
Wu, X.2
Li, X.-Y.3
He, Y.4
Liu, Y.5
-
5
-
-
84898685015
-
Efficient and privacy-aware data aggregation in mobile sensing
-
March
-
Q. Li, G. Cao, and T. La Porta, "Efficient and privacy-aware data aggregation in mobile sensing," Dependable and Secure Computing, IEEE Transactions on, vol. 11, no. 2, pp. 115-129, March 2014.
-
(2014)
Dependable and Secure Computing, IEEE Transactions on
, vol.11
, Issue.2
, pp. 115-129
-
-
Li, Q.1
Cao, G.2
La Porta, T.3
-
6
-
-
84883432332
-
Verifiable privacy-preserving aggregation in people-centric urban sensing systems
-
September
-
R. Zhang, J. Shi, Y. Zhang, and C. Zhang, "Verifiable privacy-preserving aggregation in people-centric urban sensing systems," Selected Areas in Communications, IEEE Journal on, vol. 31, no. 9, pp. 268-278, September 2013.
-
(2013)
Selected Areas in Communications, IEEE Journal on
, vol.31
, Issue.9
, pp. 268-278
-
-
Zhang, R.1
Shi, J.2
Zhang, Y.3
Zhang, C.4
-
7
-
-
84958038878
-
Crowdsourcing in cyber-physical systems: Stochastic optimization with strong stability
-
M. Li and P. Li, "Crowdsourcing in cyber-physical systems: Stochastic optimization with strong stability," Emerging Topics in Computing, IEEE Transactions on, vol. 1, no. 2, pp. 218-231, 2013.
-
(2013)
Emerging Topics in Computing, IEEE Transactions on
, vol.1
, Issue.2
, pp. 218-231
-
-
Li, M.1
Li, P.2
-
8
-
-
84873449020
-
Cloud-enabled privacypreserving collaborative learning for mobile sensing
-
B. Liu, Y. Jiang, F. Sha, and R. Govindan, "Cloud-enabled privacypreserving collaborative learning for mobile sensing," in Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems. ACM, 2012, pp. 57-70.
-
(2012)
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems. ACM
, pp. 57-70
-
-
Liu, B.1
Jiang, Y.2
Sha, F.3
Govindan, R.4
-
9
-
-
85041436451
-
Ppdm: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems
-
J. Zhou, Z. Cao, X. Dong, and X. Lin, "Ppdm: Privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems," Selected Topics in Signal Processing, IEEE Journal of, vol. PP, no. 99, pp. 1-1, 2015.
-
(2015)
Selected Topics in Signal Processing, IEEE Journal of
, Issue.99
, pp. 1
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Lin, X.4
-
10
-
-
84893568892
-
Privacy-preserving revocable content sharing in geosocial networks
-
Oct
-
L. Guo, C. Zhang, and Y. Fang, "Privacy-preserving revocable content sharing in geosocial networks," in Communications and Network Security (CNS), 2013 IEEE Conference on, Oct 2013, pp. 118-126.
-
(2013)
Communications and Network Security (CNS), 2013 IEEE Conference on
, pp. 118-126
-
-
Guo, L.1
Zhang, C.2
Fang, Y.3
-
11
-
-
84866889971
-
Paas: A privacy-preserving attribute-based authentication system for ehealth networks
-
L. Guo, C. Zhang, J. Sun, and Y. Fang, "Paas: A privacy-preserving attribute-based authentication system for ehealth networks," in Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on. IEEE, 2012, pp. 224-233.
-
(2012)
Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference On. IEEE
, pp. 224-233
-
-
Guo, L.1
Zhang, C.2
Sun, J.3
Fang, Y.4
-
12
-
-
84904105879
-
Privacy-preserving attributebased friend search in geosocial networks with untrusted servers
-
L. Guo, X. Zhu, C. Zhang, and Y. Fang, "Privacy-preserving attributebased friend search in geosocial networks with untrusted servers," in Global Communications Conference (GLOBECOM), 2013 IEEE. IEEE, 2013, pp. 629-634.
-
(2013)
Global Communications Conference (GLOBECOM), 2013 IEEE. IEEE
, pp. 629-634
-
-
Guo, L.1
Zhu, X.2
Zhang, C.3
Fang, Y.4
-
13
-
-
84904430840
-
Fine: A fine-grained privacy-preserving location-based service framework for mobile devices
-
J. Shao, R. Lu, and X. Lin, "Fine: A fine-grained privacy-preserving location-based service framework for mobile devices," in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 244-252.
-
(2014)
INFOCOM, 2014 Proceedings IEEE. IEEE
, pp. 244-252
-
-
Shao, J.1
Lu, R.2
Lin, X.3
-
14
-
-
57349110591
-
Anonysense: Privacy-aware people-centric sensing
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, "Anonysense: privacy-aware people-centric sensing," in Proceedings of the 6th international conference on Mobile systems, applications, and services. ACM, 2008, pp. 211-224.
-
(2008)
Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services. ACM
, pp. 211-224
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Triandopoulos, N.6
-
15
-
-
66549119801
-
Opportunistic sensing: Security challenges for the new paradigm
-
A. Kapadia, D. Kotz, and N. Triandopoulos, "Opportunistic sensing: Security challenges for the new paradigm," in Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International. IEEE, 2009, pp. 1-10.
-
(2009)
Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International. IEEE
, pp. 1-10
-
-
Kapadia, A.1
Kotz, D.2
Triandopoulos, N.3
-
16
-
-
85075489334
-
Privacypreserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacypreserving aggregation of time-series data." in NDSS, vol. 2, no. 3, 2011, p. 4.
-
(2011)
NDSS
, vol.2
, Issue.3
, pp. 4
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
17
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in Smart Grid Communications (Smart-GridComm), 2010 First IEEE International Conference on. IEEE, 2010, pp. 327-332.
-
(2010)
Smart Grid Communications (Smart-GridComm), 2010 First IEEE International Conference On. IEEE
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
18
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Springer
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers," in Advances in Cryptology-CRYPTO 2010. Springer, 2010, pp. 465-482.
-
(2010)
Advances in Cryptology-CRYPTO 2010
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
19
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
Springer
-
S. Benabbas, R. Gennaro, and Y. Vahlis, "Verifiable delegation of computation over large datasets," in Advances in Cryptology-CRYPTO 2011. Springer, 2011, pp. 111-131.
-
(2011)
Advances in Cryptology-CRYPTO 2011
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
21
-
-
80051963720
-
Optimal verification of operations on dynamic sets
-
Springer
-
C. Papamanthou, R. Tamassia, and N. Triandopoulos, "Optimal verification of operations on dynamic sets," in Advances in Cryptology-CRYPTO 2011. Springer, 2011, pp. 91-110.
-
(2011)
Advances in Cryptology-CRYPTO 2011
, pp. 91-110
-
-
Papamanthou, C.1
Tamassia, R.2
Triandopoulos, N.3
-
22
-
-
84954232998
-
Verifiable privacy-preserving monitoring for cloud-assisted mhealth systems
-
L. Guo, Y. Fang, M. Li, and P. Li, "Verifiable privacy-preserving monitoring for cloud-assisted mhealth systems," in INFOCOM, 2015 Proceedings IEEE. IEEE, 2015.
-
(2015)
INFOCOM, 2015 Proceedings IEEE. IEEE
-
-
Guo, L.1
Fang, Y.2
Li, M.3
Li, P.4
-
23
-
-
84964898936
-
Privacy-preserving verifiable proximity test for location-based services
-
San Diego, USA, Dec
-
G. Zhuo, Q. Jia, L. Guo, M. Li, and Y. Fang, "Privacy-preserving verifiable proximity test for location-based services," in GC' 15-Security, San Diego, USA, Dec. 2015.
-
(2015)
GC' 15-Security
-
-
Zhuo, G.1
Jia, Q.2
Guo, L.3
Li, M.4
Fang, Y.5
-
24
-
-
84910661762
-
Efficiently verifiable computation on encrypted data
-
D. Fiore, R. Gennaro, and V. Pastro, "Efficiently verifiable computation on encrypted data," in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014, pp. 844-855.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM
, pp. 844-855
-
-
Fiore, D.1
Gennaro, R.2
Pastro, V.3
-
25
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Advances in CryptologyCRYPTO 2001. Springer, 2001, pp. 213-229.
-
(2001)
Advances in CryptologyCRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
27
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. J. Menezes, T. Okamoto, S. Vanstone et al., "Reducing elliptic curve logarithms to logarithms in a finite field," Information Theory, IEEE Transactions on, vol. 39, no. 5, pp. 1639-1646, 1993.
-
(1993)
Information Theory, IEEE Transactions on
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.3
-
28
-
-
84856466374
-
(leveled) fully homomorphic encryption without bootstrapping
-
New York, NY, USA: ACM
-
Z. Brakerski, C. Gentry, and V. Vaikuntanathan, "(leveled) fully homomorphic encryption without bootstrapping," in Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ser. ITCS '12. New York, NY, USA: ACM, 2012, pp. 309-325. [Online]. Available: http://doi.acm.org/10.1145/2090236.2090262
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, Ser. ITCS '12
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
29
-
-
80051986706
-
Fully homomorphic encryption from ring-lwe and security for key dependent messages
-
Springer
-
Z. Brakerski and V. Vaikuntanathan, "Fully homomorphic encryption from ring-lwe and security for key dependent messages," in Advances in Cryptology-CRYPTO 2011. Springer, 2011, pp. 505-524.
-
(2011)
Advances in Cryptology-CRYPTO 2011
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
30
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
M. Backes, D. Fiore, and R. M. Reischuk, "Verifiable delegation of computation on outsourced data," in Proceedings of the 2013 ACM SIGSAC conference on Computer &communications security. ACM, 2013, pp. 863-874.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer &Communications Security. ACM
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
31
-
-
84866761388
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, 2012, pp. 295-302.
-
(2012)
Cloud Computing (CLOUD), 2012 IEEE 5th International Conference On. IEEE
, pp. 295-302
-
-
Wang, B.1
Li, B.2
Li, H.3
-
33
-
-
84983291037
-
-
access June 20
-
S. Halevi and V. Shoup, "Helib, http://shaih.github.io/HElib/," access June 20, 2015.
-
(2015)
Helib
-
-
Halevi, S.1
Shoup, V.2
-
34
-
-
84983291024
-
-
access December 31
-
UCLA, "Socr data mlb heightsweights, http://wiki.stat.ucla.edu/socr/ index.php/SOCR Data MLB HeightsWeights," access December 31, 2015.
-
(2015)
Socr Data Mlb Heightsweights
-
-
|