-
2
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth sys-Tems
-
May
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth sys-Tems, '' IEEE J. Sel. Areas Commun, vol. 27, no. 4, pp. 365-378, May 2009.
-
(2009)
IEEE J. Sel. Areas Commun
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
3
-
-
85013287725
-
Internet of Things based energy aware smart home control system
-
M. Khan, B. N. Silva, and K. Han, Internet of Things based energy aware smart home control system, '' IEEE Access, vol. 4, pp. 7556-7566, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 7556-7566
-
-
Khan, M.1
Silva, B.N.2
Han, K.3
-
4
-
-
84979828629
-
Anchor-Assisted and vote-based trustworthiness assurance in smart city crowdsensing
-
M. Pouryazdan, B. Kantarci, T. Soyata, and H. Song, Anchor-Assisted and vote-based trustworthiness assurance in smart city crowdsensing, '' IEEE Access, vol. 4, pp. 529-541, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 529-541
-
-
Pouryazdan, M.1
Kantarci, B.2
Soyata, T.3
Song, H.4
-
5
-
-
84996879815
-
Defining a smart nation: The case of Singapore
-
S. L. Hoe, Defining a smart nation: The case of singapore, '' J. Inf., Comm, Ethics Soc, vol. 14, no. 4, pp. 323-333, 2016.
-
(2016)
J. Inf., Comm, Ethics Soc
, vol.14
, Issue.4
, pp. 323-333
-
-
Hoe, S.L.1
-
6
-
-
84864583229
-
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communica-Tions
-
Sep
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communica-Tions, '' IEEE Trans. Parallel Distrib. Syst, vol. 23, no. 9, pp. 1621-1631, Sep. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
7
-
-
85006022079
-
Identity in the Internet-of-Things (IoT): New challenges and opportunities
-
Singapore, Nov./Dec
-
K.-Y. Lam and C.-H. Chi, Identity in the Internet-of-Things (IoT): New challenges and opportunities, '' in Proc. 18th Int. Conf. Inf. Commun. Secur. (ICICS), Singapore, Nov./Dec. 2016, pp. 18-26.
-
(2016)
Proc. 18th Int. Conf. Inf. Commun. Secur. (ICICS
, pp. 18-26
-
-
Lam, K.-Y.1
Chi, C.-H.2
-
8
-
-
85000702101
-
IoT-based big data: From smart city towards next generation super city planning
-
M. M. Rathore, A. Paul, A. Ahmad, and G. Jeon, IoT-based big data: From smart city towards next generation super city planning, '' Int. J. Semantic Web Inf. Syst, vol. 13, no. 1, pp. 28-47, 2017.
-
(2017)
Int. J. Semantic Web Inf. Syst
, vol.13
, Issue.1
, pp. 28-47
-
-
Rathore, M.M.1
Paul, A.2
Ahmad, A.3
Jeon, G.4
-
9
-
-
82555196697
-
BECAN: A bandwidth-efficient cooperative authentication scheme forfiltering injected false data in wireless sensor networks
-
Jan
-
R. Lu, X. Lin, H. Zhu, X. Liang, and X. S. Shen, BECAN: A bandwidth-efficient cooperative authentication scheme forfiltering injected false data in wireless sensor networks, '' IEEE Trans. Parallel Distrib. Syst, vol. 23, no. 1, pp. 32-43, Jan. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst
, vol.23
, Issue.1
, pp. 32-43
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Liang, X.4
Shen, X.S.5
-
10
-
-
84866627419
-
Fog com-puting and its role in the Internet of Things
-
Helsinki, Finland Aug
-
F. Bonomi, R. A. Milito, J. Zhu, and S. Addepalli, Fog com-puting and its role in the Internet of Things, '' in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., Helsinki, Finland, Aug. 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.A.2
Zhu, J.3
Addepalli, S.4
-
11
-
-
84986211321
-
Fog computing: Helping the internet of things realize its potential
-
Aug
-
A. V. Dastjerdi and R. Buyya, Fog computing: Helping the Internet of Things realize its potential, '' IEEE Comput, vol. 49, no. 8, pp. 112-116, Aug. 2016.
-
(2016)
IEEE Comput
, vol.49
, Issue.8
, pp. 112-116
-
-
Dastjerdi, A.V.1
Buyya, R.2
-
12
-
-
84953720896
-
Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing
-
London, U.K., Jun
-
R. Deng, R. Lu, C. Lai, and T. H. Luan, Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing, '' in Proc. IEEE Int. Conf. Commun. (ICC), London, U.K., Jun. 2015, pp. 3909-3914.
-
(2015)
Proc. IEEE Int. Conf. Commun. (ICC
, pp. 3909-3914
-
-
Deng, R.1
Lu, R.2
Lai, C.3
Luan, T.H.4
-
13
-
-
84976578659
-
The emerging era of fog computing and networking [the president's page
-
Jun
-
H. Freeman and T. Zhang, The emerging era of fog computing and networking [the president's page], '' IEEE Commun. Mag, vol. 54, no. 6, pp. 4-5, Jun. 2016.
-
(2016)
IEEE Commun. Mag
, vol.54
, Issue.6
, pp. 4-5
-
-
Freeman, H.1
Zhang, T.2
-
14
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
San Diego, CA, USA Feb
-
E. Shi, T. H. Chan, E. G. Rieffel, R. Chow, and D. Song, Privacy-preserving aggregation of time-series data, '' in Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS), San Diego, CA, USA, Feb. 2011.
-
(2011)
Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS
-
-
Shi, E.1
Chan, T.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
15
-
-
84860843542
-
A security architecture for data aggregation and access control in smart grids
-
Online]. Available
-
S. Ruj, A. Nayak, and I. Stojmenovic, A security architecture for data aggregation and access control in smart grids, '' CoRR, 2011. [Online]. Available: http://arxiv.org/abs/1111.2619
-
(2011)
CoRR
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
16
-
-
84881051236
-
LPDA: A lightweight privacy-preserving data aggregation scheme for smart grid
-
Huangshan, China Oct
-
K. Alharbi and X. Lin, LPDA: A lightweight privacy-preserving data aggregation scheme for smart grid, '' in Proc. Int. Conf. Wire-less Commun. Signal Process. (WCSP), Huangshan, China, Oct. 2012, pp. 1-6.
-
(2012)
Proc. Int. Conf. Wire-less Commun. Signal Process. (WCSP
, pp. 1-6
-
-
Alharbi, K.1
Lin, X.2
-
17
-
-
84865833847
-
Privacy-preserving stream aggrega-Tion with fault tolerance
-
Kralendijk, Bonaire, Feb./Mar
-
T.-H. H. Chan, E. Shi, and D. Song, Privacy-preserving stream aggrega-Tion with fault tolerance, '' in Proc. 16th Int. Conf. Financial Cryptogr. Data Secur., Kralendijk, Bonaire, Feb./Mar. 2012, pp. 200-214.
-
(2012)
Proc. 16th Int. Conf. Financial Cryptogr. Data Secur
, pp. 200-214
-
-
Chan, T.-H.H.1
Shi, E.2
Song, D.3
-
18
-
-
84938749511
-
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications
-
Sep
-
L. Chen, R. Lu, Z. Cao, K. AlHarbi, and X. Lin, MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications, '' Peer-Peer Netw. Appl, vol. 8, no. 5, pp. 777-792, Sep. 2015.
-
(2015)
Peer-Peer Netw. Appl
, vol.8
, Issue.5
, pp. 777-792
-
-
Chen, L.1
Lu, R.2
Cao, Z.3
AlHarbi, K.4
Lin, X.5
-
19
-
-
84940888725
-
PDA: A privacy-preserving dual-functional aggregation scheme for smart grid commu-nications
-
Oct
-
C. Li, R. Lu, H. Li, L. Chen, and J. Chen, PDA: A privacy-preserving dual-functional aggregation scheme for smart grid commu-nications, '' Secur. Commun. Netw, vol. 8, no. 15, pp. 2494-2506, Oct. 2015.
-
(2015)
Secur. Commun. Netw
, vol.8
, Issue.15
, pp. 2494-2506
-
-
Li, C.1
Lu, R.2
Li, H.3
Chen, L.4
Chen, J.5
-
20
-
-
84942054531
-
A lightweight data aggregation scheme achiev-ing privacy preservation and data integrity with differential privacy and fault tolerance
-
Jan
-
H. Bao and R. Lu, A lightweight data aggregation scheme achiev-ing privacy preservation and data integrity with differential privacy and fault tolerance, '' Peer-Peer Netw. Appl, vol. 10, no. 1, pp. 106-121, Jan. 2017.
-
(2017)
Peer-Peer Netw. Appl
, vol.10
, Issue.1
, pp. 106-121
-
-
Bao, H.1
Lu, R.2
-
21
-
-
84962586174
-
Comment on privacy-enhanced data aggregation scheme against internal attackers in smart grid
-
Feb
-
H. Bao and R. Lu, Comment on privacy-enhanced data aggregation scheme against internal attackers in smart grid, ''' IEEE Trans. Ind. Infor-mat, vol. 12, no. 1, pp. 2-5, Feb. 2016.
-
(2016)
IEEE Trans. Ind. Infor-mat
, vol.12
, Issue.1
, pp. 2-5
-
-
Bao, H.1
Lu, R.2
-
22
-
-
84930037545
-
A new differentially private data aggregation with fault tolerance for smart grid communications
-
Jun
-
H. Bao and R. Lu, A new differentially private data aggregation with fault tolerance for smart grid communications, '' IEEE Internet Things J, vol. 2, no. 3, pp. 248-258, Jun. 2015.
-
(2015)
IEEE Internet Things J
, vol.2
, Issue.3
, pp. 248-258
-
-
Bao, H.1
Lu, R.2
-
23
-
-
84939575812
-
PDAFT: A privacy-preserving data aggre-gation scheme with fault tolerance for smart grid communications
-
Nov
-
L. Chen, R. Lu, and Z. Cao, PDAFT: A privacy-preserving data aggre-gation scheme with fault tolerance for smart grid communications, '' Peer-Peer Netw. Appl, vol. 8, no. 6, pp. 1122-1132, Nov. 2015.
-
(2015)
Peer-Peer Netw. Appl
, vol.8
, Issue.6
, pp. 1122-1132
-
-
Chen, L.1
Lu, R.2
Cao, Z.3
-
24
-
-
84958983833
-
A lightweight privacy-preserving scheme with data integrity for smart grid communications
-
Mar
-
H. Bao and L. Chen, A lightweight privacy-preserving scheme with data integrity for smart grid communications, '' Concurrency Comput., Pract. Exper, vol. 28, no. 4, pp. 1094-1110, Mar. 2016.
-
(2016)
Concurrency Comput., Pract. Exper
, vol.28
, Issue.4
, pp. 1094-1110
-
-
Bao, H.1
Chen, L.2
-
25
-
-
84955332068
-
Privacy-preserving data aggregation scheme against internal attackers in smart grids
-
Feb
-
D. He, N. Kumar, and J.-H. Lee, Privacy-preserving data aggregation scheme against internal attackers in smart grids, '' Wireless Netw, vol. 22, no. 2, pp. 491-502, Feb. 2016.
-
(2016)
Wireless Netw
, vol.22
, Issue.2
, pp. 491-502
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
-
26
-
-
84983314455
-
Privacy-preserving veri fiable data aggregation and analysis for cloud-Assisted mobile crowdsourcing
-
San Francisco, CA, USA Apr
-
G. Zhuo, Q. Jia, L. Guo, M. Li, and P. Li, Privacy-preserving veri fiable data aggregation and analysis for cloud-Assisted mobile crowdsourcing, '? in Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM), San Francisco, CA, USA, Apr. 2016, pp. 1-9.
-
(2016)
Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM
, pp. 1-9
-
-
Zhuo, G.1
Jia, Q.2
Guo, L.3
Li, M.4
Li, P.5
-
27
-
-
84964798293
-
A novel privacy-preserving set aggregation scheme for smart grid communications
-
San Diego, CA, USA, Dec
-
R. Lu, K. Alharbi, X. Lin, and C. Huang, A novel privacy-preserving set aggregation scheme for smart grid communications, '' in Proc. IEEE Global Commun. Conf. (GLOBECOM), San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE Global Commun. Conf. (GLOBECOM
, pp. 1-6
-
-
Lu, R.1
Alharbi, K.2
Lin, X.3
Huang, C.4
-
28
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Prague, Czech Republic May
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, '' in Proc. Int. Conf. Theory Appl. Cryptogr. Tech. Adv. Cryptol. (EUROCRYPT), Prague, Czech Republic, May 1999, pp. 223-238.
-
(1999)
Proc. Int. Conf. Theory Appl. Cryptogr. Tech. Adv. Cryptol. (EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
29
-
-
33746335051
-
Differential privacy
-
Venice, Italy Jul
-
C. Dwork, Differential privacy, '' in Proc. 33rd Int. Colloq. Autom., Lang. Programm. (ICALP), Venice, Italy, Jul. 2006, pp. 1-12.
-
(2006)
Proc. 33rd Int. Colloq. Autom., Lang. Programm. (ICALP
, pp. 1-12
-
-
Dwork, C.1
-
30
-
-
0033690336
-
Efficient authen-Tication and signing of multicast streams over lossy channels
-
Berkeley, CA, USA, May
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, Efficient authen-Tication and signing of multicast streams over lossy channels, '' in Proc. IEEE Symp. Secur. Privacy, Berkeley, CA, USA, May 2000, pp. 56-73.
-
(2000)
Proc. IEEE Symp. Secur. Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
31
-
-
84871605204
-
Universally utility-maximizing privacy mechanisms
-
A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utility-maximizing privacy mechanisms, '' SIAM J. Comput, vol. 41, no. 6, pp. 1673-1693, 2012.
-
(2012)
SIAM J. Comput
, vol.41
, Issue.6
, pp. 1673-1693
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
32
-
-
67651030465
-
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
-
1-20:36
-
C. Castelluccia, A. C. Chan, E. Mykletun, and G. Tsudik, Efficient and provably secure aggregation of encrypted data in wireless sensor networks, '' ACM Trans. Sensor Netw, vol. 5, no. 3, pp. 20:1-20:36, 2009.
-
(2009)
ACM Trans. Sensor Netw
, vol.5
, Issue.3
, pp. 20
-
-
Castelluccia, C.1
Chan, A.C.2
Mykletun, E.3
Tsudik, G.4
-
33
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Cambridge, MA, USA Feb
-
D. Boneh, E.-J. Goh, and K. Nissim, Evaluating 2-DNF formulas on ciphertexts, '' in Proc. 2nd Theory Cryptogr. Conf. Theory Cryptogr. (TCC), Cambridge, MA, USA, Feb. 2005, pp. 325-341.
-
(2005)
Proc. 2nd Theory Cryptogr. Conf. Theory Cryptogr. (TCC
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
34
-
-
80051986706
-
Fully homomorphic encryption from ring-LWE and security for key dependent messages
-
Santa Barbara, CA, USA Aug
-
Z. Brakerski and V. Vaikuntanathan, Fully homomorphic encryption from ring-LWE and security for key dependent messages, '' in Proc. 31st Annu. Cryptol. Conf. Adv. Cryptol. (CRYPTO), Santa Barbara, CA, USA, Aug. 2011, pp. 505-524.
-
(2011)
Proc. 31st Annu. Cryptol. Conf. Adv. Cryptol. (CRYPTO
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
|