-
1
-
-
75449104170
-
Smart objects as building blocks for the Internet of things
-
Kortuem, G., Kawsar, F., Fitton, D., Sundramoorthy, V., Smart objects as building blocks for the Internet of things. IEEE Internet Comput. 14:1 (2010), 44–51.
-
(2010)
IEEE Internet Comput.
, vol.14
, Issue.1
, pp. 44-51
-
-
Kortuem, G.1
Kawsar, F.2
Fitton, D.3
Sundramoorthy, V.4
-
2
-
-
77956877124
-
The Internet of things: A survey
-
Atzori, L., Iera, A., Morabito, G., The Internet of things: A survey. Comput. Netw. 54:15 (2010), 2787–2805.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. A view of cloud computing. Commun. ACM 53:4 (2010), 50–58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
4
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24:1 (2013), 131–143.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
5
-
-
84866627419
-
Fog computing and its role in the Internet of things
-
ACM
-
Bonomi, F., Milito, R., Zhu, J., Addepalli, S., Fog computing and its role in the Internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 2012, ACM, 13–16.
-
(2012)
Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
6
-
-
84925450955
-
Fog computing: A platform for Internet of things and analytics
-
Springer
-
Bonomi, F., Milito, R., Natarajan, P., Zhu, J., Fog computing: A platform for Internet of things and analytics. Big Data and Internet of Things: A Roadmap for Smart Environments, 2014, Springer, 169–186.
-
(2014)
Big Data and Internet of Things: A Roadmap for Smart Environments
, pp. 169-186
-
-
Bonomi, F.1
Milito, R.2
Natarajan, P.3
Zhu, J.4
-
7
-
-
84888226819
-
Sensor requirements for activity recognition on smart watches
-
ACM
-
Bieber, G., Haescher, M., Vahl, M., Sensor requirements for activity recognition on smart watches. Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013, ACM, 67.
-
(2013)
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments
, pp. 67
-
-
Bieber, G.1
Haescher, M.2
Vahl, M.3
-
8
-
-
0028148673
-
Suitability of aqueous dispersions of dextran and concanavalin a for glucose sensing in different variants of the affinity sensor
-
Ballerstädt, R., Ehwald, R., Suitability of aqueous dispersions of dextran and concanavalin a for glucose sensing in different variants of the affinity sensor. Biosens. Bioelectron. 9:8 (1994), 557–567.
-
(1994)
Biosens. Bioelectron.
, vol.9
, Issue.8
, pp. 557-567
-
-
Ballerstädt, R.1
Ehwald, R.2
-
9
-
-
18844409386
-
An evaluation of multi-resolution storage for sensor networks
-
ACM
-
Ganesan, D., Greenstein, B., Perelyubskiy, D., Estrin, D., Heidemann, J., An evaluation of multi-resolution storage for sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003, ACM, 89–102.
-
(2003)
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems
, pp. 89-102
-
-
Ganesan, D.1
Greenstein, B.2
Perelyubskiy, D.3
Estrin, D.4
Heidemann, J.5
-
10
-
-
0024880831
-
Multilayer feedforward networks are universal approximators
-
Hornik, K., Stinchcombe, M., White, H., Multilayer feedforward networks are universal approximators. Neural Netw. 2:5 (1989), 359–366.
-
(1989)
Neural Netw.
, vol.2
, Issue.5
, pp. 359-366
-
-
Hornik, K.1
Stinchcombe, M.2
White, H.3
-
11
-
-
0036127092
-
A review of evidence of health benefit from artificial neural networks in medical intervention
-
Lisboa, P.J., A review of evidence of health benefit from artificial neural networks in medical intervention. Neural Netw. 15:1 (2002), 11–39.
-
(2002)
Neural Netw.
, vol.15
, Issue.1
, pp. 11-39
-
-
Lisboa, P.J.1
-
12
-
-
71049141891
-
Clinical decision support systems: a review on knowledge representation and inference under uncertainties
-
Kong, G., Xu, D.-L., Yang, J.-B., Clinical decision support systems: a review on knowledge representation and inference under uncertainties. Int. J. Comput. Intell. Syst. 1:2 (2008), 159–167.
-
(2008)
Int. J. Comput. Intell. Syst.
, vol.1
, Issue.2
, pp. 159-167
-
-
Kong, G.1
Xu, D.-L.2
Yang, J.-B.3
-
13
-
-
85009103544
-
Healthcare-related data in the cloud: Challenges and opportunities
-
Casola, V., Castiglione, A., Choo, K.R., Esposito, C., Healthcare-related data in the cloud: Challenges and opportunities. IEEE Cloud Comput. 3:6 (2016), 10–14.
-
(2016)
IEEE Cloud Comput.
, vol.3
, Issue.6
, pp. 10-14
-
-
Casola, V.1
Castiglione, A.2
Choo, K.R.3
Esposito, C.4
-
14
-
-
84970003207
-
Trustworthy processing of healthcare big data in hybrid clouds
-
Nepal, S., Ranjan, R., Choo, K.R., Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Comput. 2:2 (2015), 78–84.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.2
, pp. 78-84
-
-
Nepal, S.1
Ranjan, R.2
Choo, K.R.3
-
15
-
-
84991735889
-
Efficient and privacy-preserving outsourced computation of rational numbers
-
Liu, X., Choo, K.-K.R., Deng, R.H., Lu, R., Weng, J., Efficient and privacy-preserving outsourced computation of rational numbers. IEEE Trans. Dependable Secure Comput., 2016.
-
(2016)
IEEE Trans. Dependable Secure Comput.
-
-
Liu, X.1
Choo, K.-K.R.2
Deng, R.H.3
Lu, R.4
Weng, J.5
-
16
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
Paillier, P., Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology, EUROCRYPT99, 1999, Springer, 223–238.
-
(1999)
Advances in Cryptology, EUROCRYPT99
, pp. 223-238
-
-
Paillier, P.1
-
17
-
-
84984984895
-
An efficient privacy-preserving outsourced calculation toolkit with multiple keys
-
Liu, X., Deng, R.H., Choo, K.-K.R., Weng, J., An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 11:11 (2016), 2401–2414.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.11
, pp. 2401-2414
-
-
Liu, X.1
Deng, R.H.2
Choo, K.-K.R.3
Weng, J.4
-
18
-
-
85029611783
-
-
Outsourcing multi-party computation, IACR Cryptology ePrint Archive 2011 (2011) 272. URL
-
S. Kamara, P. Mohassel, M. Raykova, Outsourcing multi-party computation, IACR Cryptology ePrint Archive 2011 (2011) 272. URL http://eprint.iacr.org/2011/272.
-
-
-
Kamara, S.1
Mohassel, P.2
Raykova, M.3
-
19
-
-
84888390701
-
Efficiently outsourcing multiparty computation under multiple keys
-
Peter, A., Tews, E., Katzenbeisser, S., Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8:12 (2013), 2046–2058.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.12
, pp. 2046-2058
-
-
Peter, A.1
Tews, E.2
Katzenbeisser, S.3
-
20
-
-
85029662127
-
-
UCI machine learning repository, 2013. URL
-
M. Lichman, UCI machine learning repository, 2013. URL http://archive.ics.uci.edu/ml.
-
-
-
Lichman, M.1
-
21
-
-
0003657593
-
Seminumerical Algorithm (Arithmetic) the Art of Computer Programming, Vol. 2
-
Knuth, D.E., Seminumerical Algorithm (Arithmetic) the Art of Computer Programming, Vol. 2. 1981.
-
(1981)
-
-
Knuth, D.E.1
-
22
-
-
84892565489
-
Privacy-preserving clinical decision support system using gaussian kernel-based classification
-
Rahulamathavan, Y., Veluru, S., Phan, R.C.-W., Chambers, J.A., Rajarajan, M., Privacy-preserving clinical decision support system using gaussian kernel-based classification. IEEE J. Biomed. Health Inform. 18:1 (2014), 56–66.
-
(2014)
IEEE J. Biomed. Health Inform.
, vol.18
, Issue.1
, pp. 56-66
-
-
Rahulamathavan, Y.1
Veluru, S.2
Phan, R.C.-W.3
Chambers, J.A.4
Rajarajan, M.5
-
23
-
-
84963815241
-
Privacy-preserving patient-centric clinical decision support system on Naive Bayesian classification
-
Liu, X., Lu, R., Ma, J., Chen, L., Qin, B., Privacy-preserving patient-centric clinical decision support system on Naive Bayesian classification. IEEE J. Biomed. Health Inform. 20 (2016), 655–668.
-
(2016)
IEEE J. Biomed. Health Inform.
, vol.20
, pp. 655-668
-
-
Liu, X.1
Lu, R.2
Ma, J.3
Chen, L.4
Qin, B.5
-
24
-
-
51749121564
-
A privacy preserving probabilistic neural network for horizontally partitioned databases
-
IEEE IJCNN 2007
-
Secretan, J., Georgiopoulos, M., Castro, J., A privacy preserving probabilistic neural network for horizontally partitioned databases. International Joint Conference on Neural Networks, 2007, IEEE, IJCNN 2007, 1554–1559.
-
(2007)
International Joint Conference on Neural Networks
, pp. 1554-1559
-
-
Secretan, J.1
Georgiopoulos, M.2
Castro, J.3
-
25
-
-
70350345197
-
Privacy-preserving backpropagation neural network learning
-
Chen, T., Zhong, S., Privacy-preserving backpropagation neural network learning. IEEE Trans. Neural Netw. 20:10 (2009), 1554–1564.
-
(2009)
IEEE Trans. Neural Netw.
, vol.20
, Issue.10
, pp. 1554-1564
-
-
Chen, T.1
Zhong, S.2
-
26
-
-
84901924319
-
Privacy preserving back-propagation neural network learning made practical with cloud computing
-
Yuan, J., Yu, S., Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25:1 (2014), 212–221.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 212-221
-
-
Yuan, J.1
Yu, S.2
-
27
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
A.C. Yao, How to generate and exchange secrets (extended abstract), in: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986, 1986, pp. 162–167.
-
(1986)
27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October
, vol.1986
, pp. 162-167
-
-
Yao, A.C.1
-
28
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Y. Huang, D. Evans, J. Katz, L. Malka, Faster secure two-party computation using garbled circuits, in: 20th USENIX Security Symposium, San Francisco, CA, USA, August 8–12, 2011, Proceedings, 2011.
-
(2011)
20th USENIX Security Symposium, San Francisco, CA, USA, August 8–12, 2011, Proceedings
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
29
-
-
84869382999
-
Foundations of garbled circuits
-
ACM
-
Bellare, M., Hoang, V.T., Rogaway, P., Foundations of garbled circuits. Proceedings of the 2012 ACM Conference on Computer and Communications Security, 2012, ACM, 784–796.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 784-796
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
30
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
Springer
-
Bogdanov, D., Laur, S., Willemson, J., Sharemind: A framework for fast privacy-preserving computations. Computer Security, ESORICS 2008, 2008, Springer, 192–206.
-
(2008)
Computer Security, ESORICS 2008
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
31
-
-
84889051602
-
An architecture for practical actively secure mpc with dishonest majority
-
ACM
-
Keller, M., Scholl, P., Smart, N.P., An architecture for practical actively secure mpc with dishonest majority. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013, ACM, 549–560.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 549-560
-
-
Keller, M.1
Scholl, P.2
Smart, N.P.3
-
32
-
-
71549138933
-
Privacy-preserving remote diagnostics
-
ACM
-
Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E., Privacy-preserving remote diagnostics. Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, ACM, 498–507.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 498-507
-
-
Brickell, J.1
Porter, D.E.2
Shmatikov, V.3
Witchel, E.4
-
33
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Springer
-
Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.-R., Schneider, T., Secure evaluation of private linear branching programs with medical applications. Computer Security, ESORICS 2009, 2009, Springer, 424–439.
-
(2009)
Computer Security, ESORICS 2009
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
34
-
-
35048822047
-
Round-optimal secure two-party computation
-
Springer
-
Katz, J., Ostrovsky, R., Round-optimal secure two-party computation. Advances in Cryptology, CRYPTO 2004, 2004, Springer, 335–354.
-
(2004)
Advances in Cryptology, CRYPTO 2004
, pp. 335-354
-
-
Katz, J.1
Ostrovsky, R.2
-
35
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
ACM
-
Vaidya, J., Clifton, C., Privacy preserving association rule mining in vertically partitioned data. Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002, ACM, 639–644.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
36
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Kantarcioglu, M., Clifton, C., Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng.(9), 2004, 1026–1037.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
37
-
-
1242331445
-
Privacy preserving mining of association rules
-
Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J., Privacy preserving mining of association rules. Inf. Syst. 29:4 (2004), 343–364.
-
(2004)
Inf. Syst.
, vol.29
, Issue.4
, pp. 343-364
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
38
-
-
79251640709
-
Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
-
Bansal, A., Chen, T., Zhong, S., Privacy preserving back-propagation neural network learning over arbitrarily partitioned data. Neural Comput. Appl. 20:1 (2011), 143–150.
-
(2011)
Neural Comput. Appl.
, vol.20
, Issue.1
, pp. 143-150
-
-
Bansal, A.1
Chen, T.2
Zhong, S.3
-
39
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
ACM
-
Vaidya, J., Clifton, C., Privacy-preserving k-means clustering over vertically partitioned data. Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003, ACM, 206–215.
-
(2003)
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
40
-
-
32344446366
-
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
-
ACM
-
Jagannathan, G., Wright, R.N., Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, 2005, ACM, 593–599.
-
(2005)
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining
, pp. 593-599
-
-
Jagannathan, G.1
Wright, R.N.2
-
41
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C., et al. Fully homomorphic encryption using ideal lattices. STOC, Vol. 9, 2009, 169–178.
-
(2009)
STOC, Vol. 9
, pp. 169-178
-
-
Gentry, C.1
-
42
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Springer
-
Smart, N.P., Vercauteren, F., Fully homomorphic encryption with relatively small key and ciphertext sizes. Public Key Cryptography, PKC 2010, 2010, Springer, 420–443.
-
(2010)
Public Key Cryptography, PKC 2010
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
-
43
-
-
85029624165
-
-
Analysis of partially and fully homomorphic encryption, (2013).
-
L. Morris, Analysis of partially and fully homomorphic encryption, http://www.liammorris.com/crypto2/Homomorphic%20Encryption%20Paper.pdf (2013).
-
-
-
Morris, L.1
-
44
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Springer
-
ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. Advances in Cryptology, 1985, Springer, 10–18.
-
(1985)
Advances in Cryptology
, pp. 10-18
-
-
ElGamal, T.1
-
45
-
-
84899651713
-
Efficient fully homomorphic encryption from (standard) lwe
-
Brakerski, Z., Vaikuntanathan, V., Efficient fully homomorphic encryption from (standard) lwe. SIAM J. Comput. 43:2 (2014), 831–871.
-
(2014)
SIAM J. Comput.
, vol.43
, Issue.2
, pp. 831-871
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
46
-
-
85025126688
-
Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data
-
E. Ayday, J.L. Raisaro, M. Laren, P. Jack, J. Fellay, J.-P. Hubaux, Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data, in: Proceedings of USENIX Security Workshop on Health Information Technologies, HealthTech”13, no. EPFL-CONF-187118, 2013.
-
(2013)
Proceedings of USENIX Security Workshop on Health Information Technologies, HealthTech”13, no. EPFL-CONF-187118
-
-
Ayday, E.1
Raisaro, J.L.2
Laren, M.3
Jack, P.4
Fellay, J.5
Hubaux, J.-P.6
|