-
1
-
-
84866627419
-
Fog computing and its role in the internet of things
-
Helsinki, Finland
-
Bonomi, F.; Milito, R.A.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16.
-
(2012)
Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.A.2
Zhu, J.3
Addepalli, S.4
-
2
-
-
85014677925
-
A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications
-
Dinh, T.; Kim, Y.; Lee, H. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications. Sensors 2017, 17, 489.
-
(2017)
Sensors
, vol.17
, pp. 489
-
-
Dinh, T.1
Kim, Y.2
Lee, H.3
-
4
-
-
84873848479
-
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
-
Lu, R.; Lin, X.; Shen, X.S. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 614–624.
-
(2013)
IEEE Trans. Parallel Distrib. Syst
, vol.24
, pp. 614-624
-
-
Lu, R.1
Lin, X.2
Shen, X.S.3
-
5
-
-
84976578659
-
The emerging era of fog computing and networking [The President’s Page]
-
Freeman, H.; Zhang, T. The emerging era of fog computing and networking [The President’s Page]. IEEE Commun. Mag. 2016, 54, 4–5.
-
(2016)
IEEE Commun. Mag
, vol.54
, pp. 4-5
-
-
Freeman, H.1
Zhang, T.2
-
6
-
-
84983103058
-
Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing
-
Yannuzzi, M.; Milito, R.A.; Serral-Gracià, R.; Montero, D.; Nemirovsky, M. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. In Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, Athens, Greece, 1–3 December 2014; pp. 325–329.
-
(2014)
In Proceedings of the 19Th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks
, pp. 325-329
-
-
Yannuzzi, M.1
Milito, R.A.2
Serral-Gracià, R.3
Montero, D.4
Nemirovsky, M.5
-
8
-
-
84951050684
-
Survey of Fog Computing: Concepts, Applications and Issues
-
Mobidata@MobiHoc 2015, Hangzhou, China
-
Yi, S.; Li, C.; Li, Q. A Survey of Fog Computing: Concepts, Applications and Issues. In Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata@MobiHoc 2015, Hangzhou, China, 21 June 2015; pp. 37–42.
-
(2015)
Proceedings of the 2015 Workshop on Mobile Big Data
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.A.3
-
9
-
-
85010075862
-
Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption
-
Deng, R.; Lu, R.; Lai, C.; Luan, T.H.; Liang, H. Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption. IEEE Internet Things J. 2016, 3, 1171–1181.
-
(2016)
IEEE Internet Things J
, vol.3
, pp. 1171-1181
-
-
Deng, R.1
Lu, R.2
Lai, C.3
Luan, T.H.4
Liang, H.5
-
10
-
-
37849032496
-
Location Privacy Protection Through Obfuscation-Based Techniques
-
Ardagna, C.A.; Cremonini, M.; Damiani, E.; di Vimercati, S.D.C.; Samarati, P. Location Privacy Protection Through Obfuscation-Based Techniques. In Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, 8–11 July 2007; pp. 47–60.
-
(2007)
Proceedings of the 21St Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, pp. 47-60
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
Di Vimercati, S.D.C.4
Samarati, P.5
-
11
-
-
33745725717
-
An anonymous communication technique using dummies for location-based services
-
Kido, H.; Yanagisawa, Y.; Satoh, T. An anonymous communication technique using dummies for location-based services. In Proceedings of the International Conference on Pervasive Services 2005, Santorini, Greece, 11–14 July 2005; pp. 88–97.
-
(2005)
Proceedings of the International Conference on Pervasive Services 2005
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
12
-
-
85018204196
-
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
-
Gruteser, M.; Grunwald, D. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, 5–8 May 2003.
-
(2003)
Proceedings of the First International Conference on Mobile Systems, Applications, and Services
-
-
Gruteser, M.1
Grunwald, D.2
-
13
-
-
34547720006
-
The New Casper: Query Processing for Location Services without Compromising Privacy
-
Mokbel, M.F.; Chow, C.; Aref, W.G. The New Casper: Query Processing for Location Services without Compromising Privacy. In Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, 12–15 September 2006; pp. 763–774.
-
(2006)
Proceedings of the 32Nd International Conference on Very Large Data Bases
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.2
Aref, W.G.3
-
14
-
-
0032201622
-
Private Information Retrieval
-
Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M. Private Information Retrieval. J. ACM 1998, 45, 965–981.
-
(1998)
J. ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
15
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
Ghinita, G.; Kalnis, P.; Khoshgozaran, A.; Shahabi, C.; Tan, K. Private queries in location based services: Anonymizers are not necessary. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, 10–12 June 2008; pp. 121–132.
-
(2008)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.5
-
16
-
-
84901814752
-
Practical k nearest neighbor queries with location privacy
-
Yi, X.; Paulet, R.; Bertino, E.; Varadharajan, V. Practical k nearest neighbor queries with location privacy. In Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, IL, USA, 31 March–4 April 2014; pp. 640–651.
-
(2014)
Proceedings of the IEEE 30Th International Conference on Data Engineering
, pp. 640-651
-
-
Yi, X.1
Paulet, R.2
Bertino, E.3
Varadharajan, V.4
-
18
-
-
84963760971
-
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
-
Li, L.; Lu, R.; Huang, C. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data. IEEE Internet Things J. 2016, 3, 206–218.
-
(2016)
IEEE Internet Things J
, vol.3
, pp. 206-218
-
-
Li, L.1
Lu, R.2
Huang, C.3
-
19
-
-
84990982166
-
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud
-
Zhu, H.; Lu, R.; Huang, C.; Chen, L.; Li, H. An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud. IEEE Trans. Veh. Technol. 2016, 65, 7729–7739.
-
(2016)
IEEE Trans. Veh. Technol
, vol.65
, pp. 7729-7739
-
-
Zhu, H.1
Lu, R.2
Huang, C.3
Chen, L.4
Li, H.5
-
20
-
-
84994236081
-
Collaborative trajectory privacy preserving scheme in location-based services
-
Peng, T.; Liu, Q.; Meng, D.; Wang, G. Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 2017, 387, 165–179.
-
(2017)
Inf. Sci
, vol.387
, pp. 165-179
-
-
Peng, T.1
Liu, Q.2
Meng, D.3
Wang, G.4
-
21
-
-
84961786656
-
Toward secure large-scale machine-to-machine comm unications in 3GPP networks: Challenges and solutions
-
Lai, C.; Lu, R.; Zheng, D.; Li, H.; Shen, X.S. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: Challenges and solutions. IEEE Commun. Mag. 2015, 53, 12–19.
-
(2015)
IEEE Commun. Mag
, vol.53
, pp. 12-19
-
-
Lai, C.1
Lu, R.2
Zheng, D.3
Li, H.4
Shen, X.S.5
-
22
-
-
84986211321
-
Fog Computing: Helping the Internet of Things Realize Its Potential
-
Dastjerdi, A.V.; Buyya, R. Fog Computing: Helping the Internet of Things Realize Its Potential. IEEE Comput. 2016, 49, 112–116.
-
(2016)
IEEE Comput
, vol.49
, pp. 112-116
-
-
Dastjerdi, A.V.1
Buyya, R.2
-
23
-
-
85016637546
-
Preserving Source Location Privacy for Energy Harvesting WSNs
-
Huang, C.; Ma, M.; Liu, Y.; Liu, A. Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 2017, 17, 724.
-
(2017)
Sensors
, vol.17
, pp. 724
-
-
Huang, C.1
Ma, M.2
Liu, Y.3
Liu, A.4
-
24
-
-
85016142194
-
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs
-
Wang, L.; Liu, G.; Sun, L. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs. Sensors 2017, 17, 668.
-
(2017)
Sensors
, vol.17
, pp. 668
-
-
Wang, L.1
Liu, G.2
Sun, L.3
-
26
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
Wong, W.K.; Cheung, D.W.; Kao, B.; Mamoulis, N. Secure kNN computation on encrypted databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Providence, RI, USA, 29 June–2 July 2009; pp. 139–152.
-
(2009)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
27
-
-
85018495637
-
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
-
Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access 2017, 5, 3302–3312.
-
(2017)
IEEE Access
, vol.5
, pp. 3302-3312
-
-
Lu, R.1
Heung, K.2
Lashkari, A.H.3
Ghorbani, A.A.4
-
28
-
-
84963778899
-
SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking
-
Yang, X.; Lu, R.; Liang, H.; Tang, X. SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking. Big Data Res. 2016, 3, 2–9.
-
(2016)
Big Data Res
, vol.3
, pp. 2-9
-
-
Yang, X.1
Lu, R.2
Liang, H.3
Tang, X.4
-
29
-
-
23044435711
-
Short Signatures from the Weil Pairing
-
Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. J. Cryptol. 2004, 17, 297–319.
-
(2004)
J. Cryptol
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
30
-
-
84973579525
-
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
-
Li, H.; Yang, Y.; Luan, T.H.; Liang, X.; Zhou, L.; Shen, X.S. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 2016, 13, 312–325.
-
(2016)
IEEE Trans. Dependable Secur. Comput
, vol.13
, pp. 312-325
-
-
Li, H.1
Yang, Y.2
Luan, T.H.3
Liang, X.4
Zhou, L.5
Shen, X.S.6
-
31
-
-
84905923774
-
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
-
Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 222–233.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
32
-
-
85023759576
-
-
New York, NY, USA
-
Liu, L.; Tamer Özsu, M. Lp Distances. In Encyclopedia of Database Systems; Springer: New York, NY, USA, 2009; p. 1662.
-
(2009)
Lp Distances. in Encyclopedia of Database Systems; Springer
, pp. 1662
-
-
Liu, L.1
Tamer Özsu, M.2
-
33
-
-
85007079359
-
Secure and Efficient Cloud Data Deduplication with Randomized Tag
-
Jiang, T.; Chen, X.; Wu, Q.; Ma, J.; Susilo, W.; Lou, W. Secure and Efficient Cloud Data Deduplication with Randomized Tag. IEEE Trans. Inf. Forensic. Sec. 2017, 12, 532–543.
-
(2017)
IEEE Trans. Inf. Forensic. Sec
, vol.12
, pp. 532-543
-
-
Jiang, T.1
Chen, X.2
Wu, Q.3
Ma, J.4
Susilo, W.5
Lou, W.6
-
35
-
-
38149054118
-
-
accessed on 19 April 2017
-
Lynn, B. PBC Library. Available online: https://crypto.stanford.edu/pbc/thesis.html (accessed on 19 April 2017).
-
PBC Library
-
-
Lynn, B.1
|