-
1
-
-
85029653885
-
-
Gartner says 6.4 billion connected “things” will be in use in 2016, up 30 percent from Available at (11/10/2015).
-
R. van der Meulen, Gartner says 6.4 billion connected “things” will be in use in 2016, up 30 percent from 2015, Available at http://www.gartner.com/newsroom/id/3165317 (11/10/2015).
-
(2015)
-
-
van der Meulen, R.1
-
2
-
-
85029657156
-
-
Idc market in a minute: Internet of things, Available at
-
Idc market in a minute: Internet of things, Available at http://www.idc.com/downloads/idc_market_in_a_minute_iot_infographic.pdf.
-
-
-
-
3
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
S. Yi, C. Li, Q. Li, A survey of fog computing: Concepts, applications and issues, in: Workshop on Mobile Big Data (Mobidata), 2015, pp. 37–42.
-
(2015)
Workshop on Mobile Big Data (Mobidata)
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
4
-
-
84866627419
-
Fog computing and its role in the Internet of things
-
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of things, in: MCC Workshop on Mobile Cloud Computing (MCC), 2012, pp. 13–16.
-
(2012)
MCC Workshop on Mobile Cloud Computing (MCC)
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
6
-
-
84925450955
-
Fog Computing: A Platform for Internet of Things and Analytics
-
Springer International Publishing
-
Bonomi, F., Milito, R., Natarajan, P., Zhu, J., Fog Computing: A Platform for Internet of Things and Analytics. 2014, Springer International Publishing, 169–186.
-
(2014)
, pp. 169-186
-
-
Bonomi, F.1
Milito, R.2
Natarajan, P.3
Zhu, J.4
-
7
-
-
84983103058
-
Key ingredients in an iot recipe: Fog computing, cloud computing, and more fog computing
-
M. Yannuzzi, R. Milito, R. Serral-Gracia, D. Montero, M. Nemirovsky, Key ingredients in an iot recipe: Fog computing, cloud computing, and more fog computing, in: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014, pp. 325–329.
-
(2014)
IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
, pp. 325-329
-
-
Yannuzzi, M.1
Milito, R.2
Serral-Gracia, R.3
Montero, D.4
Nemirovsky, M.5
-
8
-
-
85029651016
-
-
An overview of the security concerns in enterprise cloud computing, CoRR abs/1101.5613, URL.
-
A. Bisong, S.M. Rahman, An overview of the security concerns in enterprise cloud computing, CoRR abs/1101.5613, 2011, pp. 1–161. URL http://arxiv.org/abs/1101.5613.
-
(2011)
, pp. 1-161
-
-
Bisong, A.1
Rahman, S.M.2
-
10
-
-
84963728330
-
Forensic-by-design framework for cyber-physical cloud systems
-
Rahman, N.H.A., Glisson, W.B., Yang, Y., Choo, K.-K.R., Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
-
(2016)
IEEE Cloud Comput.
, vol.3
, Issue.1
, pp. 50-59
-
-
Rahman, N.H.A.1
Glisson, W.B.2
Yang, Y.3
Choo, K.-K.R.4
-
11
-
-
84958035718
-
On Lightweight Security Enforcement in Cyber-Physical Systems
-
Springer International Publishing
-
Yang, Y., Lu, J., Choo, K.-K.R., Liu, J.K., On Lightweight Security Enforcement in Cyber-Physical Systems. 2016, Springer International Publishing, 97–112.
-
(2016)
, pp. 97-112
-
-
Yang, Y.1
Lu, J.2
Choo, K.-K.R.3
Liu, J.K.4
-
12
-
-
85018167456
-
Forensic investigation of {P2P} cloud storage services and backbone for iot networks: Bittorrent sync as a case study
-
Teing, Y.-Y., Dehghantanha, A., Choo, K.-K.R., Yang, L.T., Forensic investigation of {P2P} cloud storage services and backbone for iot networks: Bittorrent sync as a case study. Comput. Electr. Eng., 2016, 1–14.
-
(2016)
Comput. Electr. Eng.
, pp. 1-14
-
-
Teing, Y.-Y.1
Dehghantanha, A.2
Choo, K.-K.R.3
Yang, L.T.4
-
13
-
-
85029665042
-
-
Mailcious insider attacks to rise, Available at
-
Mailcious insider attacks to rise, Available at http://news.bbc.co.uk/2/hi/7875904.stm.
-
-
-
-
14
-
-
85029619702
-
-
Ex-employees say it's ok to take corporate data with them, Available at
-
Ex-employees say it's ok to take corporate data with them, Available at http://www.darkreading.com/insider-threat/167801100/security/vulnerabilities/240148112/ex-employees-say-it-s-ok-to-take-corporate-data-with-them.
-
-
-
-
15
-
-
84924712095
-
Efficient self-healing group key management with dynamic revocation and collusion resistance for scada in smart grid
-
Jiang, R., Lu, R., Luo, J., Lai, C., Shen, X.S., Efficient self-healing group key management with dynamic revocation and collusion resistance for scada in smart grid. Secur. Commun. Netw. 8:6 (2015), 1026–1039.
-
(2015)
Secur. Commun. Netw.
, vol.8
, Issue.6
, pp. 1026-1039
-
-
Jiang, R.1
Lu, R.2
Luo, J.3
Lai, C.4
Shen, X.S.5
-
16
-
-
84991570412
-
Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study
-
Cahyani, N.D.W., Martini, B., Choo, K.-K.R., Al-Azhar, A.M.N., Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurr. Comput.: Pract. Exper., 2016, 1–16.
-
(2016)
Concurr. Comput.: Pract. Exper.
, pp. 1-16
-
-
Cahyani, N.D.W.1
Martini, B.2
Choo, K.-K.R.3
Al-Azhar, A.M.N.4
-
17
-
-
84990043590
-
Data exfiltration from Internet of things devices: ios devices as case studies
-
D'Orazio, C.J., Choo, K.-K.R., Yang, L.T., Data exfiltration from Internet of things devices: ios devices as case studies. IEEE Internet Things J. PP:99 (2016), 1–12.
-
(2016)
IEEE Internet Things J.
, vol.PP
, Issue.99
, pp. 1-12
-
-
D'Orazio, C.J.1
Choo, K.-K.R.2
Yang, L.T.3
-
18
-
-
85019802521
-
A technique to circumvent ssl/tls validations on ios devices
-
D'Orazio, C.J., Choo, K.-K.R., A technique to circumvent ssl/tls validations on ios devices. Future Gener. Comput. Syst., 2016, 1–9.
-
(2016)
Future Gener. Comput. Syst.
, pp. 1-9
-
-
D'Orazio, C.J.1
Choo, K.-K.R.2
-
19
-
-
78650259456
-
Secure Key Establishment, Vol. 41
-
Springer US
-
Choo, K.-K.R., Secure Key Establishment, Vol. 41. 2009, Springer, US.
-
(2009)
-
-
Choo, K.-K.R.1
-
20
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
Goyal, V., Pandey, O., Sahai, A., Waters, B., Attribute-based encryption for fine-grained access control of encrypted data. ACM Conference on Computer and Communications Security, (CCS), 2006, ACM, 89–98.
-
(2006)
ACM Conference on Computer and Communications Security, (CCS)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
21
-
-
84951824554
-
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data
-
Springer International Publishing
-
Yang, Y., Liu, J.K., Liang, K., Choo, K.-K.R., Zhou, J., Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. 2015, Springer International Publishing, 146–166.
-
(2015)
, pp. 146-166
-
-
Yang, Y.1
Liu, J.K.2
Liang, K.3
Choo, K.-K.R.4
Zhou, J.5
-
22
-
-
84936984467
-
Cloud based data sharing with fine-grained proxy re-encryption
-
Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., Choo, K.-K.R., Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28 (2016), 122–134.
-
(2016)
Pervasive Mob. Comput.
, vol.28
, pp. 122-134
-
-
Yang, Y.1
Zhu, H.2
Lu, H.3
Weng, J.4
Zhang, Y.5
Choo, K.-K.R.6
-
23
-
-
84899741794
-
Cloudedup: Secure deduplication with encrypted data for cloud storage
-
P. Puzio, R. Molva, M. Onen, S. Loureiro, Cloudedup: Secure deduplication with encrypted data for cloud storage, in: IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Vol. 1, 2013, pp. 363–370.
-
(2013)
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
, vol.1
, pp. 363-370
-
-
Puzio, P.1
Molva, R.2
Onen, M.3
Loureiro, S.4
-
24
-
-
84922468481
-
Block-level de-duplication with encrypted data
-
Puzio, P., Molva, R., Önen, M., Loureiro, S., Block-level de-duplication with encrypted data. Open J. Cloud Comput. (OJCC) 1:1 (2014), 10–18.
-
(2014)
Open J. Cloud Comput. (OJCC)
, vol.1
, Issue.1
, pp. 10-18
-
-
Puzio, P.1
Molva, R.2
Önen, M.3
Loureiro, S.4
-
25
-
-
84954136616
-
Secure deduplication of encrypted data without additional independent servers
-
J. Liu, N. Asokan, B. Pinkas, Secure deduplication of encrypted data without additional independent servers, in: ACM Conference on Computer and Communications Security (CCS), 2015, pp. 874–885.
-
(2015)
ACM Conference on Computer and Communications Security (CCS)
, pp. 874-885
-
-
Liu, J.1
Asokan, N.2
Pinkas, B.3
-
26
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, A. Shulman-Peleg, Proofs of ownership in remote storage systems, in: ACM Conference on Computer and Communications Security (CCS), 2011, pp. 491–500.
-
(2011)
ACM Conference on Computer and Communications Security (CCS)
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
27
-
-
84863584951
-
Private data deduplication protocols in cloud storage
-
W.K. Ng, Y. Wen, H. Zhu, Private data deduplication protocols in cloud storage, in: Annual ACM Symposium on Applied Computing (SAC), 2012, pp. 441–446.
-
(2012)
Annual ACM Symposium on Applied Computing (SAC)
, pp. 441-446
-
-
Ng, W.K.1
Wen, Y.2
Zhu, H.3
-
28
-
-
84877968673
-
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
J. Xu, E.-C. Chang, J. Zhou, Weak leakage-resilient client-side deduplication of encrypted data in cloud storage, in: ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013, pp. 195–206.
-
(2013)
ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 195-206
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
-
29
-
-
80051904512
-
The communication and computation cost of wireless security: Extended abstract
-
D. Singelee, S. Seys, L. Batina, I. Verbauwhede, The communication and computation cost of wireless security: Extended abstract, in: ACM Conference on Wireless Network Security (WiSec), 2011, pp. 1–4.
-
(2011)
ACM Conference on Wireless Network Security (WiSec)
, pp. 1-4
-
-
Singelee, D.1
Seys, S.2
Batina, L.3
Verbauwhede, I.4
-
30
-
-
84929956069
-
Esc: An efficient, scalable, and crypto-less solution to secure wireless networks
-
Di Pietro, R., Oligeri, G., Esc: An efficient, scalable, and crypto-less solution to secure wireless networks. Comput. Netw. 84 (2015), 46–63.
-
(2015)
Comput. Netw.
, vol.84
, pp. 46-63
-
-
Di Pietro, R.1
Oligeri, G.2
-
31
-
-
70349237760
-
Secure data deduplication
-
M.W. Storer, K. Greenan, D.D. Long, E.L. Miller, Secure data deduplication, in: ACM International Workshop on Storage Security and Survivability (StorageSS), 2008, pp. 1–10.
-
(2008)
ACM International Workshop on Storage Security and Survivability (StorageSS)
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
Miller, E.L.4
-
32
-
-
85052022812
-
Dupless: Server-aided encryption for deduplicated storage
-
S. Keelveedhi, M. Bellare, T. Ristenpart, Dupless: Server-aided encryption for deduplicated storage, in: USENIX Security Symposium, 2013, pp. 179–194.
-
(2013)
USENIX Security Symposium
, pp. 179-194
-
-
Keelveedhi, S.1
Bellare, M.2
Ristenpart, T.3
-
33
-
-
84883391608
-
Message-Locked Encryption and Secure Deduplication
-
Springer Berlin, Heidelberg
-
Bellare, M., Keelveedhi, S., Ristenpart, T., Message-Locked Encryption and Secure Deduplication. 2013, Springer, Berlin, Heidelberg, 296–312.
-
(2013)
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
34
-
-
85084163110
-
Convergent dispersal: Toward storage-efficient security in a cloud-of-clouds
-
M. Li, C. Qin, P.P.C. Lee, J. Li, Convergent dispersal: Toward storage-efficient security in a cloud-of-clouds, in: USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage), Philadelphia, PA, 2014, pp. 1–5.
-
(2014)
USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage), Philadelphia, PA
, pp. 1-5
-
-
Li, M.1
Qin, C.2
Lee, P.P.C.3
Li, J.4
-
35
-
-
85077119766
-
Cdstore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal
-
M. Li, C. Qin, P.P.C. Lee, Cdstore: Toward reliable, secure, and cost-efficient cloud storage via convergent dispersal, in: USENIX Annual Technical Conference (USENIX), Santa Clara, CA, 2015, pp. 111–124.
-
(2015)
USENIX Annual Technical Conference (USENIX), Santa Clara, CA
, pp. 111-124
-
-
Li, M.1
Qin, C.2
Lee, P.P.C.3
-
36
-
-
84946905043
-
Secure distributed deduplication systems with improved reliability
-
Li, J., Chen, X., Huang, X., Tang, S., Xiang, Y., Hassan, M.M., Alelaiwi, A., Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 64:12 (2015), 3569–3579.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.12
, pp. 3569-3579
-
-
Li, J.1
Chen, X.2
Huang, X.3
Tang, S.4
Xiang, Y.5
Hassan, M.M.6
Alelaiwi, A.7
-
37
-
-
84961369151
-
Security of Ramp Schemes
-
Springer Berlin, Heidelberg
-
Blakley, G.R., Meadows, C., Security of Ramp Schemes. 1985, Springer, Berlin, Heidelberg, 242–268.
-
(1985)
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.2
-
38
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Rabin, M.O., Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36:2 (1989), 335–348.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
39
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
J.R. Douceur, A. Adya, W.J. Bolosky, D. Simon, M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system, in: International Conference on Distributed Computing Systems (ICDCS), 2002, pp. 617–624.
-
(2002)
International Conference on Distributed Computing Systems (ICDCS)
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
40
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: Deduplication in cloud storage. IEEE Secur. Privacy 8:6 (2010), 40–47.
-
(2010)
IEEE Secur. Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
41
-
-
84872371278
-
Privacy-preserving cross-user source-based data deduplication in cloud storage
-
S. Lee, D. Choi, Privacy-preserving cross-user source-based data deduplication in cloud storage, in: International Conference on ICT Convergence (ICTC), 2012, pp. 329–330.
-
(2012)
International Conference on ICT Convergence (ICTC)
, pp. 329-330
-
-
Lee, S.1
Choi, D.2
-
42
-
-
84863892951
-
Improving the resistance to side-channel attacks on cloud storage services
-
O. Heen, C. Neumann, L. Montalvo, S. Defrance, Improving the resistance to side-channel attacks on cloud storage services, in: International Conference on New Technologies, Mobility and Security (NTMS), 2012, pp. 1–5.
-
(2012)
International Conference on New Technologies, Mobility and Security (NTMS)
, pp. 1-5
-
-
Heen, O.1
Neumann, C.2
Montalvo, L.3
Defrance, S.4
-
43
-
-
84893588264
-
Security weakness in the proof of storage with deduplication.
-
Y. Shin, J. Hur, K. Kim, Security weakness in the proof of storage with deduplication., in: IACR Cryptology ePrint Archive 2012 (2012) 1–11.
-
(2012)
in: IACR Cryptology ePrint Archive
, vol.2012
, pp. 1-11
-
-
Shin, Y.1
Hur, J.2
Kim, K.3
-
44
-
-
84928914432
-
Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation
-
Nam, J., Choo, K.-K.R., Han, S., Kim, M., Paik, J., Won, D., Efficient and anonymous two-factor user authentication in wireless sensor networks: Achieving user anonymity with lightweight sensor computation. PLoS One 10:4 (2015), 1–21.
-
(2015)
PLoS One
, vol.10
, Issue.4
, pp. 1-21
-
-
Nam, J.1
Choo, K.-K.R.2
Han, S.3
Kim, M.4
Paik, J.5
Won, D.6
-
45
-
-
84978264488
-
Towards Lightweight Anonymous Entity Authentication for IoT Applications
-
Springer International Publishing
-
Yang, Y., Cai, H., Wei, Z., Lu, H., Choo, K.-K.R., Towards Lightweight Anonymous Entity Authentication for IoT Applications. 2016, Springer International Publishing, 265–280.
-
(2016)
, pp. 265-280
-
-
Yang, Y.1
Cai, H.2
Wei, Z.3
Lu, H.4
Choo, K.-K.R.5
-
46
-
-
84857486926
-
Hash challenges: Stretching the limits of compare-by-hash in distributed data deduplication
-
Barreto, J., Veiga, L., Ferreira, P., Hash challenges: Stretching the limits of compare-by-hash in distributed data deduplication. Inform. Process. Lett. 112:10 (2012), 380–385.
-
(2012)
Inform. Process. Lett.
, vol.112
, Issue.10
, pp. 380-385
-
-
Barreto, J.1
Veiga, L.2
Ferreira, P.3
-
47
-
-
84922430173
-
An efficient confidentiality-preserving proof of ownership for deduplication
-
González-Manzano, L., Orfila, A., An efficient confidentiality-preserving proof of ownership for deduplication. J. Netw. Comput. Appl. 50 (2015), 49–59.
-
(2015)
J. Netw. Comput. Appl.
, vol.50
, pp. 49-59
-
-
González-Manzano, L.1
Orfila, A.2
-
48
-
-
84942514912
-
Enabling encrypted cloud media center with secure deduplication
-
Y. Zheng, X. Yuan, X. Wang, J. Jiang, C. Wang, X. Gui, Enabling encrypted cloud media center with secure deduplication, in: ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015, pp. 63–72.
-
(2015)
ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 63-72
-
-
Zheng, Y.1
Yuan, X.2
Wang, X.3
Jiang, J.4
Wang, C.5
Gui, X.6
-
49
-
-
84966687388
-
Selective encryption and component-oriented deduplication for mobile cloud data computing
-
S. Song, B.-Y. Choi, D. Kim, Selective encryption and component-oriented deduplication for mobile cloud data computing, in: International Conference on Computing, Networking and Communications (ICNC), 2016, pp. 1–5.
-
(2016)
International Conference on Computing, Networking and Communications (ICNC)
, pp. 1-5
-
-
Song, S.1
Choi, B.-Y.2
Kim, D.3
-
51
-
-
85013193718
-
Sdm: Smart deduplication for mobile cloud storage
-
Widodo, R.N., Lim, H., Atiquzzaman, M., Sdm: Smart deduplication for mobile cloud storage. Future Gener. Comput. Syst., 2016, 1–10.
-
(2016)
Future Gener. Comput. Syst.
, pp. 1-10
-
-
Widodo, R.N.1
Lim, H.2
Atiquzzaman, M.3
-
52
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Li, J., Chen, X., Li, M., Li, J., Lee, P.P.C., Lou, W., Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25:6 (2014), 1615–1625.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.P.C.5
Lou, W.6
-
53
-
-
84893256200
-
Anonymous deduplication of encrypted data with proof of ownership in cloud storage
-
X. Jin, L. Wei, M. Yu, N. Yu, J. Sun, Anonymous deduplication of encrypted data with proof of ownership in cloud storage, in: IEEE/CIC International Conference on Communications in China (ICCC), 2013, pp. 224–229.
-
(2013)
IEEE/CIC International Conference on Communications in China (ICCC)
, pp. 224-229
-
-
Jin, X.1
Wei, L.2
Yu, M.3
Yu, N.4
Sun, J.5
-
54
-
-
85029642226
-
-
Telefonica, the response of the csps to the iot burst, Available at
-
Telefonica, the response of the csps to the iot burst, Available at https://iot.telefonica.com/multimedia-resources/the-response-of-the-csps-to-the-iot-burst-whitepaper.
-
-
-
-
55
-
-
13444291124
-
Efficient near-duplicate detection and sub-image retrieval
-
Y. Ke, R. Sukthankar, L. Huston, Y. Ke, R. Sukthankar, Efficient near-duplicate detection and sub-image retrieval, in: ACM Multimedia, Vol. 4, 2004, pp. 1–10.
-
(2004)
ACM Multimedia
, vol.4
, pp. 1-10
-
-
Ke, Y.1
Sukthankar, R.2
Huston, L.3
Ke, Y.4
Sukthankar, R.5
-
56
-
-
84983316657
-
Compoundeyes: Near-duplicate detection in large scale online video systems in the cloud
-
Y. Chen, W. He, Y. Hua, W. Wang, Compoundeyes: Near-duplicate detection in large scale online video systems in the cloud, in: IEEE International Conference on Computer Communications (INFOCOM), 2016, pp. 1–9.
-
(2016)
IEEE International Conference on Computer Communications (INFOCOM)
, pp. 1-9
-
-
Chen, Y.1
He, W.2
Hua, Y.3
Wang, W.4
-
58
-
-
80053020495
-
-
I Have a DREAM! (DiffeRentially privatE smArt Metering)
-
G. Ács, C. Castelluccia, I Have a DREAM! (DiffeRentially privatE smArt Metering), 2011, pp. 118–132.
-
(2011)
, pp. 118-132
-
-
Ács, G.1
Castelluccia, C.2
-
59
-
-
80052663001
-
Differentially private data release for data mining
-
N. Mohammed, R. Chen, B.C.M. Fung, P.S. Yu, Differentially private data release for data mining, in: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2011, pp. 493–501.
-
(2011)
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
60
-
-
84971637093
-
Privacy-preserving-outsourced association rule mining on vertically partitioned databases
-
Li, L., Lu, R., Choo, K.-K.R., Datta, A., Shao, S., Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11:8 (2016), 1847–1861.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.8
, pp. 1847-1861
-
-
Li, L.1
Lu, R.2
Choo, K.-K.R.3
Datta, A.4
Shao, S.5
-
61
-
-
84959860456
-
Secure multi-server-aided data deduplication in cloud computing
-
Special Issue on Secure Ubiquitous Computing
-
Miao, M., Wang, J., Li, H., Chen, X., Secure multi-server-aided data deduplication in cloud computing. Pervasive Mob. Comput. 24 (2015), 129–137 Special Issue on Secure Ubiquitous Computing.
-
(2015)
Pervasive Mob. Comput.
, vol.24
, pp. 129-137
-
-
Miao, M.1
Wang, J.2
Li, H.3
Chen, X.4
-
62
-
-
84937705612
-
Distributed key generation for encrypted deduplication: Achieving the strongest privacy
-
Y. Duan, Distributed key generation for encrypted deduplication: Achieving the strongest privacy, in: ACM Workshop on Cloud Computing Security (CCSW), 2014, pp. 57–68.
-
(2014)
ACM Workshop on Cloud Computing Security (CCSW)
, pp. 57-68
-
-
Duan, Y.1
-
63
-
-
84975507051
-
An android social app forensics adversary model
-
A. Azfar, K.-K.R. Choo, L. Liu, An android social app forensics adversary model, in: Hawaii International Conference on System Sciences (HICSS), 2016, pp. 5597–5606.
-
(2016)
Hawaii International Conference on System Sciences (HICSS)
, pp. 5597-5606
-
-
Azfar, A.1
Choo, K.-K.R.2
Liu, L.3
-
64
-
-
84949096402
-
An adversary model to evaluate DRM protection of video contents on ios devices
-
D'Orazio, C., Choo, K.-K.R., An adversary model to evaluate DRM protection of video contents on ios devices. Comput. Secur. 56 (2016), 94–110.
-
(2016)
Comput. Secur.
, vol.56
, pp. 94-110
-
-
D'Orazio, C.1
Choo, K.-K.R.2
-
65
-
-
84986550725
-
A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps
-
D'Orazio, C.J., Lu, R., Choo, K.-K.R., Vasilakos, A.V., A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps. Appl. Math. Comput. 293 (2017), 523–544.
-
(2017)
Appl. Math. Comput.
, vol.293
, pp. 523-544
-
-
D'Orazio, C.J.1
Lu, R.2
Choo, K.-K.R.3
Vasilakos, A.V.4
-
66
-
-
84947587045
-
A forensically sound adversary model for mobile devices
-
Do, Q., Martini, B., Choo, K.-K.R., A forensically sound adversary model for mobile devices. PLoS One 10:9 (2015), 1–15.
-
(2015)
PLoS One
, vol.10
, Issue.9
, pp. 1-15
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
67
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., Password authentication with insecure communication. Commun. ACM 24:11 (1981), 770–772.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
68
-
-
80051993169
-
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
-
Springer Berlin, Heidelberg
-
Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M., Fully Homomorphic Encryption over the Integers with Shorter Public Keys. 2011, Springer, Berlin, Heidelberg, 487–504.
-
(2011)
, pp. 487-504
-
-
Coron, J.-S.1
Mandal, A.2
Naccache, D.3
Tibouchi, M.4
-
69
-
-
85029625540
-
-
Available at
-
Raspberry pi, Available at http://www.raspberrypi.org/.
-
-
-
-
70
-
-
85029645574
-
-
Wikipedia, List of conutries by Internet connection speeds, Available at
-
Wikipedia, List of conutries by Internet connection speeds, Available at https://en.wikipedia.org/wiki/List_of_countries_by_Internet_connection_speeds.
-
-
-
-
71
-
-
0242341057
-
Multicast group behavior in the Internet's multicast backbone (mbone)
-
Almeroth, K.C., Ammar, M.H., Multicast group behavior in the Internet's multicast backbone (mbone). IEEE Commun. Mag. 35:6 (1997), 124–129.
-
(1997)
IEEE Commun. Mag.
, vol.35
, Issue.6
, pp. 124-129
-
-
Almeroth, K.C.1
Ammar, M.H.2
-
72
-
-
84866753149
-
Multi-level selective deduplication for vm snapshots in cloud storage
-
W. Zhang, H. Tang, H. Jiang, T. Yang, X. Li, Y. Zeng, Multi-level selective deduplication for vm snapshots in cloud storage, in: IEEE International Conference on Cloud Computing (CLOUD), 2012, pp. 550–557.
-
(2012)
IEEE International Conference on Cloud Computing (CLOUD)
, pp. 550-557
-
-
Zhang, W.1
Tang, H.2
Jiang, H.3
Yang, T.4
Li, X.5
Zeng, Y.6
-
73
-
-
35048887476
-
Short Group Signatures
-
Springer Berlin, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H., Short Group Signatures. 2004, Springer, Berlin, Heidelberg, 41–55.
-
(2004)
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
74
-
-
35248851617
-
Correlation-resistant storage via keyword-searchable encryption
-
L. Ballard, M. Green, B. de Medeiros, F. Monrose, Correlation-resistant storage via keyword-searchable encryption, in: IACR Cryptology ePrint Archive 2005, 2005, pp. 1–17.
-
(2005)
in: IACR Cryptology ePrint Archive 2005
, pp. 1-17
-
-
Ballard, L.1
Green, M.2
de Medeiros, B.3
Monrose, F.4
|