-
1
-
-
85082212722
-
-
Java Pairing-Based Cryptography Library.
-
Java Pairing-Based Cryptography Library. http://gas.dia.unisa.it/projects/jpbc/.
-
-
-
-
2
-
-
85082219852
-
-
Raspberry Pi.
-
Raspberry Pi. https://www.raspberrypi.org/.
-
-
-
-
3
-
-
85082213324
-
-
The 10 most popular Internet of Things applications.
-
The 10 most popular Internet of Things applications. http://iot-analytics.com/10-internet-of-things-applications/.
-
-
-
-
5
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7): 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
6
-
-
39049153474
-
Using attribute-based access control to enable attribute-based messaging
-
R. Bobba, O. Fatemieh, F. Khan, C. A. Gunter, and H. Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC, 2006.
-
(2006)
ACSAC
-
-
Bobba, R.1
Fatemieh, O.2
Khan, F.3
Gunter, C.A.4
Khurana, H.5
-
7
-
-
33646870054
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology, 2005.
-
(2005)
Advances in Cryptology
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
9
-
-
84860853220
-
Toward secure targeted broadcast in smart grid
-
Z. M. Fadlullah, N. Kato, R. Lu, X. Shen, and Y. Nozaki. Toward secure targeted broadcast in smart grid. Communications Magazine, IEEE, 2012.
-
(2012)
Communications Magazine, IEEE
-
-
Fadlullah, Z.M.1
Kato, N.2
Lu, R.3
Shen, X.4
Nozaki, Y.5
-
11
-
-
79960854270
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Advances in Cryptology. 2010.
-
(2010)
Advances in Cryptology
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
12
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In CCS, 2006.
-
(2006)
CCS
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
16
-
-
84880652100
-
Attribute-based encryption with verifiable outsourced decryption
-
J. Lai, R. H. Deng, C. Guan, and J. Weng. Attribute-based encryption with verifiable outsourced decryption. Information Forensics and Security, IEEE Transactions on, 8(8): 1343-1354, 2013.
-
(2013)
Information Forensics and Security IEEE Transactions on
, vol.8
, Issue.8
, pp. 1343-1354
-
-
Lai, J.1
Deng, R.H.2
Guan, C.3
Weng, J.4
-
17
-
-
84876027843
-
Preserving data integrity for smart grid data aggregation
-
F. Li and B. Luo. Preserving data integrity for smart grid data aggregation. In SmartGridComm, 2012.
-
(2012)
SmartGridComm
-
-
Li, F.1
Luo, B.2
-
18
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
IEEE
-
F. Li, B. Luo, and P. Liu. Secure information aggregation for smart grids using homomorphic encryption. In SmartGridComm. IEEE, 2010.
-
(2010)
SmartGridComm
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
19
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang. Securely outsourcing attribute-based encryption with checkability. Parallel and Distributed Systems, IEEE Transactions on, 25(8): 2201-2210, 2014.
-
(2014)
Parallel and Distributed Systems IEEE Transactions on
, vol.25
, Issue.8
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.3
Chen, X.4
Xiang, Y.5
-
20
-
-
84896819685
-
Detecting false data injection attacks on power grid by sparse optimization
-
L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han. Detecting false data injection attacks on power grid by sparse optimization. Smart Grid, IEEE Transactions on, 5(2): 612-621, 2014.
-
(2014)
Smart Grid IEEE Transactions on
, vol.5
, Issue.2
, pp. 612-621
-
-
Liu, L.1
Esmalifalak, M.2
Ding, Q.3
Emesih, V.A.4
Han, Z.5
-
21
-
-
84864583229
-
Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
R. Lu, X. Liang, X. Li, X. Lin, and X. S. Shen. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. Parallel and Distributed Systems, IEEE Transactions on, 2012.
-
(2012)
Parallel and Distributed Systems, IEEE Transactions on
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.S.5
-
22
-
-
84873848479
-
Spoc: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency
-
R. Lu, X. Lin, and X. Shen. Spoc: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. Parallel and Distributed Systems, IEEE Transactions on, 2013.
-
(2013)
Parallel and Distributed Systems IEEE Transactions on
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
23
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 2012.
-
(2012)
Ad Hoc Networks
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
26
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11): 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
28
-
-
84904410658
-
Vabks: Verifiable attribute-based keyword search over outsourced encrypted data
-
IEEE
-
Q. Zheng, S. Xu, and G. Ateniese. Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In Infocom, IEEE, 2014.
-
(2014)
Infocom
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
-
29
-
-
84872074603
-
Efficient and secure data storage operations for mobile cloud computing
-
Z. Zhou and D. Huang. Efficient and secure data storage operations for mobile cloud computing. In Network and Service Management, 2012.
-
(2012)
Network and Service Management
-
-
Zhou, Z.1
Huang, D.2
|