-
1
-
-
84986631527
-
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K., A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11:11 (2016), 2594–2608.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Qin, Z.4
Sun, X.5
Ren, K.6
-
2
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27:9 (2016), 2546–2559.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.9
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
3
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27:2 (2015), 340–352.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
4
-
-
84866627419
-
Fog computing and its role in the Internet of things
-
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the Internet of things, in: Proceedings of MCC’12, Helsinki, Finland, Aug. 13–17, 2012, pp. 13–16.
-
(2012)
Proceedings of MCC’12, Helsinki, Finland, Aug. 13–17
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
5
-
-
84925450955
-
Fog computing: A platform for Internet of things and analytics
-
Springer International Publishing
-
Bonomi, F., Milito, R., Natarajan, P., Zhu, J., Fog computing: A platform for Internet of things and analytics. Big Data and Internet of Things: A Roadmap for Smart Environments, 2014, Springer International Publishing, 169–186.
-
(2014)
Big Data and Internet of Things: A Roadmap for Smart Environments
, pp. 169-186
-
-
Bonomi, F.1
Milito, R.2
Natarajan, P.3
Zhu, J.4
-
6
-
-
84951050684
-
A survey of fog computing: concepts, applications and issues
-
S. Yi, C. Li, Q. Li, A survey of fog computing: concepts, applications and issues, in: Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, Jun. 22–25, 2015, pp. 37–42.
-
(2015)
Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, Jun. 22–25
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
7
-
-
84962076525
-
Fog computing: issues and challenges in security and forensics
-
Y. Wang, T. Uehara, R. Sasaki, Fog computing: issues and challenges in security and forensics, in: Proceedings of COMPSAC’15, Taichung, July 1–5, 2015, pp. 53–59.
-
(2015)
Proceedings of COMPSAC’15, Taichung, July 1–5
, pp. 53-59
-
-
Wang, Y.1
Uehara, T.2
Sasaki, R.3
-
8
-
-
84943612463
-
Security and privacy issues of fog computing: a survey
-
S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: a survey, in: Proceedings of WASA 2015, LNCS 9204, Qufu, China, Aug. 10–12, 2015, pp. 685–695.
-
(2015)
Proceedings of WASA 2015, LNCS 9204, Qufu, China, Aug. 10–12
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
9
-
-
84928596525
-
An overview of fog computing and its security issues
-
Stojmenovic, I., Wen, S., Huang, X., Luan, H., An overview of fog computing and its security issues. Concurr. Comput.: Pract. Exper. 28:10 (2016), 2991–3005, 10.1002/cpe.3485.
-
(2016)
Concurr. Comput.: Pract. Exper.
, vol.28
, Issue.10
, pp. 2991-3005
-
-
Stojmenovic, I.1
Wen, S.2
Huang, X.3
Luan, H.4
-
10
-
-
0030577321
-
A new privacy homomorphism and applications
-
Domingo-Ferrer, J., A new privacy homomorphism and applications. Inform. Process. Lett. 60:5 (1996), 277–282.
-
(1996)
Inform. Process. Lett.
, vol.60
, Issue.5
, pp. 277-282
-
-
Domingo-Ferrer, J.1
-
11
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
J. Domingo-Ferrer, A provably secure additive and multiplicative privacy homomorphism, in: Proceedings of ISC 2002, LNCS 2433, São Paulo, Brazil, Sep. 30-Oct. 2, 2002, pp. 471–483.
-
(2002)
Proceedings of ISC 2002, LNCS 2433, São Paulo, Brazil, Sep. 30-Oct.
, vol.2
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
12
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Proceedings of EUROCRYPT’99, Prague, Czech Republic, May 2–6, 1999, pp. 223–238.
-
(1999)
Proceedings of EUROCRYPT’99, Prague, Czech Republic, May 2–6
, pp. 223-238
-
-
Paillier, P.1
-
13
-
-
0035751083
-
-
Paillier's cryptosystem revisited, in: Proceedings of CCS’01, Swissôtel Chicago, Chicago, USA, Oct. 17–21, 2011, pp. 206–214.
-
D. Catalano, R. Gennaro, N. Howgrave-Graham, P.Q. Nguyen, Paillier's cryptosystem revisited, in: Proceedings of CCS’01, Swissôtel Chicago, Chicago, USA, Oct. 17–21, 2011, pp. 206–214.
-
-
-
Catalano, D.1
Gennaro, R.2
Howgrave-Graham, N.3
Nguyen, P.Q.4
-
14
-
-
52149096989
-
An efficient semantically secure elliptic curve cryptosystem based on KMOV
-
D. Galindo, S. Martín, P. Morillo, J.L. Villar, An efficient semantically secure elliptic curve cryptosystem based on KMOV, in: Proceedings of WCC’03, Versailles, France, Mar. 24–28, 2003, pp. 213–221.
-
(2003)
Proceedings of WCC’03, Versailles, France, Mar. 24–28
, pp. 213-221
-
-
Galindo, D.1
Martín, S.2
Morillo, P.3
Villar, J.L.4
-
15
-
-
0027720973
-
LUC: A new public key system
-
P. Smith, M.J.J. Lennon, LUC: A new public key system, in: Proceedings of IFIP/Sec’93, Toronto, Canada, May 12–14, 1993, pp. 103–117.
-
(1993)
Proceedings of IFIP/Sec’93, Toronto, Canada, May 12–14
, pp. 103-117
-
-
Smith, P.1
Lennon, M.J.J.2
-
16
-
-
33947653261
-
An efficient probabilistic public-key cryptosystem over quadratic fields quotients
-
Castagnos, G., An efficient probabilistic public-key cryptosystem over quadratic fields quotients. Finite Fields Appl. 13:3 (2007), 563–576.
-
(2007)
Finite Fields Appl.
, vol.13
, Issue.3
, pp. 563-576
-
-
Castagnos, G.1
-
17
-
-
84864583229
-
Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Lu, R., Liang, X., Li, X., Lin, X., Shen, X., Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23:9 (2012), 1621–1631.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
18
-
-
84861586183
-
Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
-
Viejo, A., Wu, Q., Domingo-Ferrer, J., Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios. Inf. Fusion 13:4 (2012), 285–295.
-
(2012)
Inf. Fusion
, vol.13
, Issue.4
, pp. 285-295
-
-
Viejo, A.1
Wu, Q.2
Domingo-Ferrer, J.3
-
19
-
-
84930435660
-
Linearly homomorphic encryption from DDH
-
G. Castagnos, F. Laguillaumie, Linearly homomorphic encryption from DDH, in: Proceedings of CT-RSA’15, San Francisco, CA, USA, April 20–24, 2015, pp. 487–505.
-
(2015)
Proceedings of CT-RSA’15, San Francisco, CA, USA, April 20–24
, pp. 487-505
-
-
Castagnos, G.1
Laguillaumie, F.2
-
20
-
-
0345058960
-
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
-
Springer Heidelberg
-
Bresson, E., Catalano, D., Pointcheval, D., A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. ASIACRYPT 2003 LNCS, vol. 2894, 2003, Springer, Heidelberg, 37–54.
-
(2003)
ASIACRYPT 2003, LNCS
, vol.2894
, pp. 37-54
-
-
Bresson, E.1
Catalano, D.2
Pointcheval, D.3
-
21
-
-
84955563270
-
Health fog: a novel framework for health and wellness applications
-
Ahmad, M., Amin, M.B., Hussain, S., Kang, B.H., Cheong, T., Lee, S., Health fog: a novel framework for health and wellness applications. J. Supercomput., 2016, 10.1007/s11227-016-1634-x.
-
(2016)
J. Supercomput.
-
-
Ahmad, M.1
Amin, M.B.2
Hussain, S.3
Kang, B.H.4
Cheong, T.5
Lee, S.6
-
22
-
-
85006994029
-
Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps
-
Orazio, C., Choo, K., Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.11.010.
-
(2016)
Future Gener. Comput. Syst.
-
-
Orazio, C.1
Choo, K.2
-
23
-
-
84994744881
-
A technique to circumvent SSL/TLS validations on iOS devices
-
Orazio, C., Choo, K., A technique to circumvent SSL/TLS validations on iOS devices. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.08.019.
-
(2016)
Future Gener. Comput. Syst.
-
-
Orazio, C.1
Choo, K.2
-
24
-
-
85018406878
-
Data exfiltration from Internet of Things devices: iOS devices as case studies
-
Orazio, C., Choo, K., Yang, L., Data exfiltration from Internet of Things devices: iOS devices as case studies. IEEE Internet Things J., 2016, 10.1109/JIOT.2016.2569094.
-
(2016)
IEEE Internet Things J.
-
-
Orazio, C.1
Choo, K.2
Yang, L.3
-
25
-
-
85007162548
-
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
-
Cahyani, N., Ab Rahman, N., Glisson, W., Choo, K., The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mob. Netw. Appl., 2016, 10.1007/s11036-016-0791-8.
-
(2016)
Mob. Netw. Appl.
-
-
Cahyani, N.1
Ab Rahman, N.2
Glisson, W.3
Choo, K.4
-
26
-
-
84922280033
-
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B:1 (2015), 190–200.
-
(2015)
IEICE Trans. Commun.
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
27
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S., Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98-D:4 (2015), 902–910.
-
(2015)
IEICE Trans. Inf. Syst.
, vol.E98-D
, Issue.4
, pp. 902-910
-
-
Ma, T.1
Zhou, J.2
Tang, M.3
Tian, Y.4
Al-Dhelaan, A.5
Al-Rodhaan, M.6
Lee, S.7
-
28
-
-
84981328411
-
A speculative approach to spatialtemporal efficiency with multiobjective optimization in a heterogeneous cloud environment
-
Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N., A speculative approach to spatialtemporal efficiency with multiobjective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9:17 (2016), 4002–4012.
-
(2016)
Secur. Commun. Netw.
, vol.9
, Issue.17
, pp. 4002-4012
-
-
Liu, Q.1
Cai, W.2
Shen, J.3
Fu, Z.4
Liu, X.5
Linge, N.6
-
29
-
-
84995871772
-
A belief propagation-based method for task allocation in open and dynamic cloud environments
-
Kong, Y., Zhang, M., Ye, D., A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl.-Based Syst. 115 (2016), 123–132.
-
(2016)
Knowl.-Based Syst.
, vol.115
, pp. 123-132
-
-
Kong, Y.1
Zhang, M.2
Ye, D.3
-
30
-
-
84856182115
-
Pseudonym changing at social spots: an effective strategy for location privacy in VANETs
-
Lu, R., Li, X., Luan, T.H., Liang, X., Shen, X., Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61:1 (2012), 86–96.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Li, X.2
Luan, T.H.3
Liang, X.4
Shen, X.5
-
31
-
-
84883345595
-
Fully anonymous profile matching in mobile social networks
-
Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., Shen, X., Fully anonymous profile matching in mobile social networks. IEEE J. Sel. Areas Commun. 31:9 (2013), 641–655.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 641-655
-
-
Liang, X.1
Li, X.2
Zhang, K.3
Lu, R.4
Lin, X.5
Shen, X.6
-
32
-
-
84937877553
-
A practical privacy-preserving targeted advertising scheme for IPTV users
-
Khayati, L.J., Orencik, C., Savas, E., Ustaoglu, B., A practical privacy-preserving targeted advertising scheme for IPTV users. Int. J. Inf. Secur., 2015, 10.1007/s10207-015-0296-7.
-
(2015)
Int. J. Inf. Secur.
-
-
Khayati, L.J.1
Orencik, C.2
Savas, E.3
Ustaoglu, B.4
-
33
-
-
84983268338
-
Towards efficient content-aware search over encrypted outsourced data in cloud
-
Z. Fu, X. Sun, S. Ji, G. Xie, Towards efficient content-aware search over encrypted outsourced data in cloud, in: Proceedings of the 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM, San Francisco, CA, 2016, http://dx.doi.org/10.1109/INFOCOM.2016.7524606.
-
(2016)
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM, San Francisco, CA
-
-
Fu, Z.1
Sun, X.2
Ji, S.3
Xie, G.4
-
34
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, in: Proceedings of CRYPTO’01, Santa Barbara, California, USA, Aug. 19–23, 2001, pp. 213–229.
-
(2001)
Proceedings of CRYPTO’01, Santa Barbara, California, USA, Aug. 19–23
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
35
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Miyaji, A., Nakabayashi, M., Takano, S., New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. 5 (2001), 1234–1243.
-
(2001)
IEICE Trans. Fundam.
, vol.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
36
-
-
84946840347
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in: Proceedings of ASIACRYPT’01, Gold Coast, Australia, Dec. 9–13, 2001, pp. 514–532.
-
(2001)
Proceedings of ASIACRYPT’01, Gold Coast, Australia, Dec. 9–13
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
|