-
1
-
-
84906788553
-
Quality of service in wide scale publish-Subscribe systems
-
3rd Quart.
-
P. Bellavista, A. Corradi, and A. Reale, "Quality of service in wide scale publish-Subscribe systems," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1591-1616, 3rd Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1591-1616
-
-
Bellavista, P.1
Corradi, A.2
Reale, A.3
-
2
-
-
84978245297
-
Confidentiality-preserving publish/subscribe: A survey
-
E. Onica, P. Felber, H. Mercier, and E. Riviére, "Confidentiality-preserving publish/subscribe: A survey," ACM Comput. Surv., vol. 49, no. 2, p. 27, 2016.
-
(2016)
ACM Comput. Surv.
, vol.49
, Issue.2
, pp. 27
-
-
Onica, E.1
Felber, P.2
Mercier, H.3
Riviére, E.4
-
4
-
-
84929587517
-
On security in publish/subscribe services: A survey
-
2nd Quart.
-
C. Esposito and M. Ciampi, "On security in publish/subscribe services: A survey," IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 966-997, 2nd Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.2
, pp. 966-997
-
-
Esposito, C.1
Ciampi, M.2
-
5
-
-
84974849300
-
A survey of security solutions for distributed publish/ subscribe systems
-
Aug.
-
A. V. Uzunov, "A survey of security solutions for distributed publish/ subscribe systems," Comput. Secur., vol. 61, pp. 94-129, Aug. 2016.
-
(2016)
Comput. Secur.
, vol.61
, pp. 94-129
-
-
Uzunov, A.V.1
-
8
-
-
85028081797
-
The composition theorem for differential privacy
-
Jun.
-
P. Kairouz, S. Oh, and P. Viswanath, "The composition theorem for differential privacy," IEEE Trans. Inf. Theory, vol. 63, no. 6, pp. 4037-4049, Jun. 2017.
-
(2017)
IEEE Trans. Inf. Theory
, vol.63
, Issue.6
, pp. 4037-4049
-
-
Kairouz, P.1
Oh, S.2
Viswanath, P.3
-
9
-
-
85018495637
-
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
-
R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 3302-3312
-
-
Lu, R.1
Heung, K.2
Lashkari, A.H.3
Ghorbani, A.A.4
-
10
-
-
85019012502
-
An efficient and fine-grained big data access control scheme with privacy-preserving policy
-
Apr.
-
K. Yang, Q. Han, H. Li, K. Zheng, Z. Su, and X. Shen"An efficient and fine-grained big data access control scheme with privacy-preserving policy," IEEE Internet Things J., vol. 4, no. 2, pp. 563-571, Apr. 2017.
-
(2017)
IEEE Internet Things J.
, vol.4
, Issue.2
, pp. 563-571
-
-
Yang, K.1
Han, Q.2
Li, H.3
Zheng, K.4
Su, Z.5
Shen, X.6
-
11
-
-
85031005100
-
-
Mar. [Online]
-
Alibaba Group. (Mar. 2017). Ali Mobile Rec. [Online]. Available: https://tianchi.aliyun.com/datalab/index.htm
-
(2017)
Ali Mobile Rec.
-
-
-
12
-
-
84994403421
-
Privacypreserving attribute-keyword based data publish-subscribe service on cloud platforms
-
May
-
K. Yang, K. Zhang, X. Jia, M. A. Hasan, and X. S. Shen, "Privacypreserving attribute-keyword based data publish-subscribe service on cloud platforms," Inf. Sci., vol. 387, pp. 116-131, May 2017.
-
(2017)
Inf. Sci.
, vol.387
, pp. 116-131
-
-
Yang, K.1
Zhang, K.2
Jia, X.3
Hasan, M.A.4
Shen, X.S.5
-
13
-
-
84905024335
-
Toward efficient and privacy-preserving computing in big data era
-
Jul./Aug.
-
R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, "Toward efficient and privacy-preserving computing in big data era," IEEE Netw., vol. 28, no. 4, pp. 46-50, Jul./Aug. 2014.
-
(2014)
IEEE Netw.
, vol.28
, Issue.4
, pp. 46-50
-
-
Lu, R.1
Zhu, H.2
Liu, X.3
Liu, J.K.4
Shao, J.5
-
14
-
-
84872392788
-
An efficient privacy preserving pub-sub system for ubiquitous computing
-
Y. Tian, B. Song, M. M. Hassan, and E.-N. Huh, "An efficient privacy preserving pub-sub system for ubiquitous computing," Int. J. Ad Hoc Ubiquitous Comput., vol. 12, no. 1, pp. 23-33, 2013.
-
(2013)
Int. J. Ad Hoc Ubiquitous Comput.
, vol.12
, Issue.1
, pp. 23-33
-
-
Tian, Y.1
Song, B.2
Hassan, M.M.3
Huh, E.-N.4
-
15
-
-
84883353658
-
Privacy preserving context aware publish subscribe systems
-
M. Nabeel, S. Appel, E. Bertino, and A. Buchmann, "Privacy preserving context aware publish subscribe systems," in Proc. Int. Conf. Netw. Syst. Secur., 2013, pp. 465-478.
-
(2013)
Proc. Int. Conf. Netw. Syst. Secur.
, pp. 465-478
-
-
Nabeel, M.1
Appel, S.2
Bertino, E.3
Buchmann, A.4
-
16
-
-
84959567873
-
Publish/subscribeenabled software defined networking for efficient and scalable IoT communications
-
Sep.
-
A. Hakiri, P. Berthou, A. Gokhale, and S. Abdellatif, "Publish/subscribeenabled software defined networking for efficient and scalable IoT communications," IEEE Commun. Mag., vol. 53, no. 9, pp. 48-54, Sep. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.9
, pp. 48-54
-
-
Hakiri, A.1
Berthou, P.2
Gokhale, A.3
Abdellatif, S.4
-
17
-
-
84958850231
-
A mobile crowd sensing ecosystem enabled by CUPUS: Cloud-based publish/subscribe middleware for the Internet of Things
-
Mar.
-
A. Antonić, M. Marjanović, K. Pripužić, and I. P. Žarko, "A mobile crowd sensing ecosystem enabled by CUPUS: Cloud-based publish/subscribe middleware for the Internet of Things," Future Generat. Comput. Syst., vol. 56, pp. 607-622, Mar. 2016.
-
(2016)
Future Generat. Comput. Syst.
, vol.56
, pp. 607-622
-
-
Antonić, A.1
Marjanović, M.2
Pripužić, K.3
Žarko, I.P.4
-
18
-
-
85018286627
-
A fog/cloud based data delivery model for publish-subscribe systems
-
Jan.
-
V. N. Pham and E. N. Huh, "A fog/cloud based data delivery model for publish-subscribe systems," in Proc. Int. Conf. Inf. Netw. (ICOIN), Jan. 2017, pp. 477-479.
-
(2017)
Proc. Int. Conf. Inf. Netw. (ICOIN)
, pp. 477-479
-
-
Pham, V.N.1
Huh, E.N.2
-
19
-
-
85019602508
-
Frequent symptom sets identification from uncertain medical data in differentially private way
-
May
-
Z. Ding, Z. Qin, and Z. Qin, "Frequent symptom sets identification from uncertain medical data in differentially private way," Sci. Program., vol. 2017, May 2017, Art. no. 7545347.
-
(2017)
Sci. Program.
, vol.2017
-
-
Ding, Z.1
Qin, Z.2
Qin, Z.3
-
20
-
-
85018814944
-
Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
-
New York, NY USA: Springer
-
A. A. Diro, N. Chilamkurti, and N. Kumar, "Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing," in Mobile Networks and Applications. New York, NY USA: Springer, 2017, pp. 1-11.
-
(2017)
Mobile Networks and Applications
, pp. 1-11
-
-
Diro, A.A.1
Chilamkurti, N.2
Kumar, N.3
-
21
-
-
84983517994
-
Security and privacy for real time video streaming using hierarchical inner product encryption based publish-subscribe architecture
-
M. A. Rajan et al., "Security and privacy for real time video streaming using hierarchical inner product encryption based publish-subscribe architecture," in Proc. 30th Int. Conf. Adv. Inf. Netw. Appl.Workshops (WAINA), 2016, pp. 373-380.
-
(2016)
Proc. 30th Int. Conf. Adv. Inf. Netw. Appl.Workshops (WAINA)
, pp. 373-380
-
-
Rajan, M.A.1
-
22
-
-
85045214053
-
An Internet of Things architecture for preserving privacy of energy consumption
-
F. Beligianni, M. Alamaniotis, A. Fevgas, P. Tsompanopoulou, P. Bozanis, and L. H. Tsoukalas, "An Internet of Things architecture for preserving privacy of energy consumption," in Proc. Medit. Conf. Power Generat., Transmiss., Distrib. Energy Convers. (MedPower), 2016, p. 107.
-
(2016)
Proc. Medit. Conf. Power Generat., Transmiss., Distrib. Energy Convers. (MedPower)
, pp. 107
-
-
Beligianni, F.1
Alamaniotis, M.2
Fevgas, A.3
Tsompanopoulou, P.4
Bozanis, P.5
Tsoukalas, L.H.6
-
23
-
-
84891787641
-
Securing broker-less publish/subscribe systems using identity-based encryption
-
Feb.
-
M. A. Tariq, B. Koldehofe, and K. Rothermel, "Securing broker-less publish/subscribe systems using identity-based encryption," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 518-528, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 518-528
-
-
Tariq, M.A.1
Koldehofe, B.2
Rothermel, K.3
-
24
-
-
85019001570
-
LACS: A lightweight label-based access control scheme in IoT-based 5G caching context
-
Q. Wang, D. Chen, N. Zhang, Z. Qin, and Z. Qin, "LACS: A lightweight label-based access control scheme in IoT-based 5G caching context," IEEE Access, vol. 5, pp. 4018-4027, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 4018-4027
-
-
Wang, Q.1
Chen, D.2
Zhang, N.3
Qin, Z.4
Qin, Z.5
-
25
-
-
84885114251
-
SmokeGrenade: An efficient key generation protocol with artificial interference
-
Nov.
-
D. Chen, Z. Qin, X. Mao, P. Yang, Z. Qin, and R.Wang, "SmokeGrenade: An efficient key generation protocol with artificial interference," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1731-1745, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1731-1745
-
-
Chen, D.1
Qin, Z.2
Mao, X.3
Yang, P.4
Qin, Z.5
Wang, R.6
-
26
-
-
85018460561
-
Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks
-
Q. Jiang, S. Zeadally, J. Ma, and D. He, "Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks," IEEE Access, vol. 5, pp. 3376-3392, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 3376-3392
-
-
Jiang, Q.1
Zeadally, S.2
Ma, J.3
He, D.4
-
27
-
-
85015170558
-
S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol
-
Feb.
-
D. Chen et al., "S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol," IEEE Internet Things J., vol. 4, no. 1, pp. 88-100, Feb. 2017.
-
(2017)
IEEE Internet Things J.
, vol.4
, Issue.1
, pp. 88-100
-
-
Chen, D.1
-
28
-
-
84905991151
-
The algorithmic foundations of differential privacy
-
C. Dwork and A. Roth, "The algorithmic foundations of differential privacy," Found. Trends Theor. Comput. Sci., vol. 9, nos. 3-4, pp. 211-407, 2014.
-
(2014)
Found. Trends Theor. Comput. Sci.
, vol.9
, Issue.3-4
, pp. 211-407
-
-
Dwork, C.1
Roth, A.2
-
29
-
-
70350645515
-
The differential privacy frontier
-
C. Dwork, "The differential privacy frontier," in Proc. Theory Cryptogr. Conf., 2009, pp. 496-502.
-
(2009)
Proc. Theory Cryptogr. Conf.
, pp. 496-502
-
-
Dwork, C.1
-
30
-
-
84904281795
-
PrivBayes: Private data release via Bayesian networks
-
J. Zhang, G. Cormode, C. M. Procopiuc, D. Srivastava, and X. Xiao, "PrivBayes: Private data release via Bayesian networks," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2014, pp. 1423-1434.
-
(2014)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 1423-1434
-
-
Zhang, J.1
Cormode, G.2
Procopiuc, C.M.3
Srivastava, D.4
Xiao, X.5
-
31
-
-
84872862536
-
PrivBasis: Frequent itemset mining with differential privacy
-
N. Li, W. Qardaji, D. Su, and J. Cao, "PrivBasis: Frequent itemset mining with differential privacy," Proc. VLDB Endowment, vol. 5, no. 11, pp. 1340-1351, 2012.
-
(2012)
Proc. VLDB Endowment
, vol.5
, Issue.11
, pp. 1340-1351
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Cao, J.4
-
32
-
-
84903633242
-
Differential privacy
-
New York, NY, USA: Springer
-
C. Dwork, "Differential privacy," in Encyclopedia of Cryptography and Security. New York, NY, USA: Springer, 2011, pp. 338-340.
-
(2011)
Encyclopedia of Cryptography and Security
, pp. 338-340
-
-
Dwork, C.1
-
33
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. Conf. Theory Cryptogr., 2006, pp. 265-284.
-
(2006)
Proc. Conf. Theory Cryptogr.
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
34
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta, "Discovering frequent patterns in sensitive data," in Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2010, pp. 503-512.
-
(2010)
Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
36
-
-
38049177468
-
Mining frequent itemsets from uncertain data
-
C. K. Chui, B. Kao, and E. Hung, "Mining frequent itemsets from uncertain data," in Proc. Adv. Knowl. Discovery Data Mining (PAKDD), 2007, pp. 47-58.
-
(2007)
Proc. Adv. Knowl. Discovery Data Mining (PAKDD)
, pp. 47-58
-
-
Chui, C.K.1
Kao, B.2
Hung, E.3
-
37
-
-
84863145281
-
EventGuard: A system architecture for securing publish-subscribe networks
-
M. Srivatsa, L. Liu, and A. Iyengar, "EventGuard: A system architecture for securing publish-subscribe networks," ACM Trans. Comput. Syst., vol. 29, no. 4, 2011, Art. no. 10.
-
(2011)
ACM Trans. Comput. Syst.
, vol.29
, Issue.4
-
-
Srivatsa, M.1
Liu, L.2
Iyengar, A.3
-
38
-
-
85030984649
-
MESA: An efficient matching scheme in content-based publish/subscribe system with simpli-fled Bayesian approach
-
presented at Chengdu, China
-
Q. Wang, D. Chen, Z. Ding, Z. Qin, and Z. Qin, "MESA: An efficient matching scheme in content-based publish/subscribe system with simpli-fled Bayesian approach," presented at 3rd Int. Conf. Big Data Comput. Commun., Chengdu, China, 2017.
-
(2017)
3rd Int. Conf. Big Data Comput. Commun.
-
-
Wang, Q.1
Chen, D.2
Ding, Z.3
Qin, Z.4
Qin, Z.5
-
39
-
-
85019880347
-
Software defined networking enabled wireless network virtualization: Challenges and solutions
-
to be published
-
N. Zhang et al., "Software defined networking enabled wireless network virtualization: Challenges and solutions," IEEE Netw., to be published, doi: 10.1109/MNET.2017.1600248.
-
IEEE Netw.
-
-
Zhang, N.1
-
40
-
-
37549018049
-
Top 10 algorithms in data mining
-
X.Wu et al., "Top 10 algorithms in data mining," Knowl. Inf. Syst., vol. 14, no. 1, pp. 1-37, 2008.
-
(2008)
Knowl. Inf. Syst.
, vol.14
, Issue.1
, pp. 1-37
-
-
Wu, X.1
|