메뉴 건너뛰기




Volumn 55, Issue 6, 2017, Pages 146-152

Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; FOG; INFORMATION MANAGEMENT; MOBILE AD HOC NETWORKS;

EID: 85028437162     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2017.1600679     Document Type: Article
Times cited : (254)

References (15)
  • 1
    • 81355138524 scopus 로고    scopus 로고
    • Mobile Crowdsensing: Current state and future challenges
    • Nov.
    • R. K. Ganti, F. Ye, and H. Lei, "Mobile Crowdsensing: Current State and Future Challenges, " IEEE Commun. Mag., vol. 49, no. 11, Nov. 2011, pp. 32-39.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.11 , pp. 32-39
    • Ganti, R.K.1    Ye, F.2    Lei, H.3
  • 2
    • 84939233387 scopus 로고    scopus 로고
    • Security and privacy in mobile crowdsourcing networks: Challenges and opportunities
    • Aug.
    • K. Yang, et al., "Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities, " IEEE Commun. Mag., vol. 53, no. 8, Aug. 2015, pp. 75-81.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.8 , pp. 75-81
    • Yang, K.1
  • 3
    • 42649121690 scopus 로고    scopus 로고
    • Security in vehicular Ad Hoc networks
    • Apr.
    • X. Lin, et al., "Security in Vehicular Ad Hoc Networks, " IEEE Commun. Mag., vol. 46, no. 4, Apr. 2008, pp. 88-95.
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.4 , pp. 88-95
    • Lin, X.1
  • 4
    • 84896853486 scopus 로고    scopus 로고
    • Vehicular cloud networking: Architecture and design principles
    • Feb.
    • E. Lee, M. Gerla, and S. Y. Oh, "Vehicular Cloud Networking: Architecture and Design Principles, " IEEE Commun. Mag., vol. 52, no. 2, Feb. 2014, pp. 148-55.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.2 , pp. 148-155
    • Lee, E.1    Gerla, M.2    Oh, S.Y.3
  • 5
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • L. M. Vaquero and L. Rodero-Merino, "Finding Your Way in the Fog: Towards a Comprehensive Definition of Fog Computing, " ACM SIGCOMM Comp. Commun. Rev., vol. 44, no. 5, 2014, pp. 27-32.
    • (2014) ACM SIGCOMM Comp. Commun. Rev. , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 6
    • 84963591605 scopus 로고    scopus 로고
    • Secure Find: Secure and privacy preserving object finding via mobile crowdsourcing
    • J. Sun, et al., "SecureFind: Secure and Privacy Preserving Object Finding via Mobile Crowdsourcing, " IEEE Trans. Wireless Commun., vol. 15, no. 3, 2016, pp. 1716-28.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.3 , pp. 1716-1728
    • Sun, J.1
  • 7
    • 84962802418 scopus 로고    scopus 로고
    • Rise of the indoor crowd: Reconstruction of building interior view via mobile crowdsourcing
    • S. Chen, et al., "Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing, " Proc. SenSys, 2015, pp. 59-71.
    • (2015) Proc. SenSys , pp. 59-71
    • Chen, S.1
  • 8
    • 84979234618 scopus 로고    scopus 로고
    • INCEPTION: Incentivizing Privacy-Preserving Data Aggregation for Mobile Crowd Sensing Systems
    • H. Jin, et al., "INCEPTION: Incentivizing Privacy-Preserving Data Aggregation for Mobile Crowd Sensing Systems, " Proc. MobiHoc, 2016, pp. 341-50.
    • (2016) Proc. MobiHoc , pp. 341-350
    • Jin, H.1
  • 9
    • 85028372832 scopus 로고    scopus 로고
    • A Limited Proxy Re-Encryption with keyword search for data access control in cloud computing
    • Z. Chen, et al., "A Limited Proxy Re-Encryption with Keyword Search for Data Access Control in Cloud Computing, " Proc. NSS, 2014, pp. 82-95.
    • (2014) Proc. NSS , pp. 82-95
    • Chen, Z.1
  • 10
    • 84940533844 scopus 로고    scopus 로고
    • Exploiting mobile social behaviors for sybil detection
    • K. Zhang, et al., "Exploiting Mobile Social Behaviors for Sybil Detection, " Proc. INFOCOM, 2015, pp. 271-79.
    • (2015) Proc. INFOCOM , pp. 271-279
    • Zhang, K.1
  • 11
    • 33745213464 scopus 로고    scopus 로고
    • Improved Proxy Re-Encryption schemes with applications to secure distributed storage
    • G. Ateniese, et al., "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, " Proc. NDSS, 2005, pp. 29-43.
    • (2005) Proc. NDSS , pp. 29-43
    • Ateniese, G.1
  • 12
    • 85009948643 scopus 로고    scopus 로고
    • Privacy-Preserving Real-Time navigation system using vehicular crowdsourcing
    • J. Ni, et al., "Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing, " Proc. VTC-Fall, 2016, pp. 1-5.
    • (2016) Proc. VTC-Fall , pp. 1-5
    • Ni, J.1
  • 13
    • 84959016733 scopus 로고    scopus 로고
    • Short randomizable signatures
    • D. Pointcheval and O. Sanders, "Short Randomizable Signatures, " Proc. CT-RSA, 2016, pp. 111-26.
    • (2016) Proc. CT-RSA , pp. 111-126
    • Pointcheval, D.1    Sanders, O.2
  • 14
    • 85015396702 scopus 로고    scopus 로고
    • Secure and deduplicated spatial crowdsourcing: A Fog-Based approach
    • J. Ni, X. Lin, K. Zhang, and Y. Yu, "Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach, " Proc. IEEE GLOBECOM, 2016, pp. 1-6.
    • (2016) Proc. IEEE GLOBECOM , pp. 1-6
    • Ni, J.1    Lin, X.2    Zhang, K.3    Yu, Y.4
  • 15
    • 84883391608 scopus 로고    scopus 로고
    • Message-Lock encryption and secure deduplication
    • M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-Lock Encryption and Secure Deduplication, " Proc. EUROCRYPT, 2013, pp. 296-312.
    • (2013) Proc. EUROCRYPT , pp. 296-312
    • Bellare, M.1    Keelveedhi, S.2    Ristenpart, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.