-
1
-
-
81355138524
-
Mobile crowdsensing: Current state and future challenges
-
Nov
-
R. K. Ganti, F. Ye, and H. Lei, "Mobile crowdsensing: Current state and future challenges," IEEE Commun. Mag., vol. 49, no. 11, pp. 32-39, Nov. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.11
, pp. 32-39
-
-
Ganti, R.K.1
Ye, F.2
Lei, H.3
-
2
-
-
85049754364
-
Realtime and spatio-temporal crowd-sourced social network data publishing with differential privacy
-
Aug
-
Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin, and K. Ren, "Realtime and spatio-temporal crowd-sourced social network data publishing with differential privacy," IEEE Trans. Depend. Sec., Aug. 2016, doi: 10.1109/TDSC.2016.2599873.
-
(2016)
IEEE Trans. Depend. Sec.
-
-
Wang, Q.1
Zhang, Y.2
Lu, X.3
Wang, Z.4
Qin, Z.5
Ren, K.6
-
3
-
-
85028394313
-
Mobile crowdsensing in software defined opportunistic networks
-
Jun
-
H. Li, K. Ota, M. Dong, and M. Guo, "Mobile crowdsensing in software defined opportunistic networks," IEEE Commun. Mag., vol. 55, no. 6, pp. 140-145, Jun. 2017.
-
(2017)
IEEE Commun. Mag.
, vol.55
, Issue.6
, pp. 140-145
-
-
Li, H.1
Ota, K.2
Dong, M.3
Guo, M.4
-
4
-
-
84907987425
-
Spatial task assignment for crowd sensing with cloaked locations
-
L. Pournajaf, L. Xiong, V. Sunderam, and S. Goryczka, "Spatial task assignment for crowd sensing with cloaked locations," in Proc. Int. Conf. Mobile Data Manage., 2014, pp. 73-82.
-
(2014)
Proc. Int. Conf. Mobile Data Manage.
, pp. 73-82
-
-
Pournajaf, L.1
Xiong, L.2
Sunderam, V.3
Goryczka, S.4
-
5
-
-
84976609538
-
A server-assigned spatial crowdsourcing framework
-
H. To, C. Shahabi, and L. Kazemi, "A server-assigned spatial crowdsourcing framework," ACM Trans. Spatial Algorithms Syst., vol. 1, no. 1, pp. 1-28, 2015.
-
(2015)
ACM Trans. Spatial Algorithms Syst.
, vol.1
, Issue.1
, pp. 1-28
-
-
To, H.1
Shahabi, C.2
Kazemi, L.3
-
6
-
-
84962419824
-
Incentives for mobile crowd sensing: A survey
-
Jan.-Mar
-
X. Zhang, et al., "Incentives for mobile crowd sensing: A survey," IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 54-67, Jan.-Mar. 2016.
-
(2016)
IEEE Commun. Surveys Tuts.
, vol.18
, Issue.1
, pp. 54-67
-
-
Zhang, X.1
-
8
-
-
84969872497
-
Providing privacy-aware incentives in mobile sensing systems
-
Jun
-
Q. Li and G. Cao, "Providing privacy-aware incentives in mobile sensing systems," IEEE Trans. Mobile Comput., vol. 15, no. 6, pp. 1485-1498, Jun. 2016.
-
(2016)
IEEE Trans. Mobile Comput.
, vol.15
, Issue.6
, pp. 1485-1498
-
-
Li, Q.1
Cao, G.2
-
9
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication," in Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296-312.
-
(2013)
Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
10
-
-
85052022812
-
DupLESS: Serveraided encryption for deduplicated storage
-
S. Keelveedhi, M. Bellare, and T. Ristenpart, "DupLESS: Serveraided encryption for deduplicated storage," in Proc. Usenix Conf. Secur., 2013, pp. 179-194.
-
(2013)
Proc. Usenix Conf. Secur.
, pp. 179-194
-
-
Keelveedhi, S.1
Bellare, M.2
Ristenpart, T.3
-
11
-
-
84970006994
-
Privacy protection for wireless medical sensor data
-
May/Jun
-
X. Yi, B. Athman, G. Dimitrios, S. Andy, and W. Jan, "Privacy protection for wireless medical sensor data," IEEE Trans. Depend. Sec., vol. 13, no. 3, pp. 369-380, May/Jun. 2016.
-
(2016)
IEEE Trans. Depend. Sec.
, vol.13
, Issue.3
, pp. 369-380
-
-
Yi, X.1
Athman, B.2
Dimitrios, G.3
Andy, S.4
Jan, W.5
-
12
-
-
85056678461
-
Trust based incentive scheme to allocate big data tasks with mobile social cloud
-
Oct
-
Q. Xu, Z. Su, S. Yu, and Y. Wang, "Trust based incentive scheme to allocate big data tasks with mobile social cloud," IEEE Trans. Big Data, Oct. 2017, doi: 10.1109/TBDATA.2017.2764925.
-
(2017)
IEEE Trans. Big Data
-
-
Xu, Q.1
Su, Z.2
Yu, S.3
Wang, Y.4
-
13
-
-
84996757871
-
Finding your way in the fog: Towards a comprehensive definition of fog computing
-
L. M. Vaquero and L. Rodero-merino, "Finding your way in the fog: Towards a comprehensive definition of fog computing," ACM SIGCOMMComput. Commun. Rev., vol. 44, no. 5, pp. 27-32, 2014.
-
(2014)
ACM SIGCOMMComput. Commun. Rev.
, vol.44
, Issue.5
, pp. 27-32
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
-
14
-
-
85042096235
-
Securing fog computing for internet of things applications: Challenges and solutions
-
Oct
-
J. Ni, K. Zhang, X. Lin, and X. Shen, "Securing fog computing for internet of things applications: Challenges and solutions," IEEE Commun. Surveys Tuts.,Oct. 2017, doi: 10.1109/COMST.2017.2762345.
-
(2017)
IEEE Commun. Surveys Tuts.
-
-
Ni, J.1
Zhang, K.2
Lin, X.3
Shen, X.4
-
15
-
-
84946840347
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," in Proc. Int. Conf. Theory Appl. Cryptology Inf. Secur.: Advances Cryptology, 2001, pp. 514-532.
-
(2001)
Proc. Int. Conf. Theory Appl. Cryptology Inf. Secur.: Advances Cryptology
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
16
-
-
77955043127
-
Asymmetric group key agreement
-
Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. Domingo-Ferrer, "Asymmetric group key agreement," in Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2009, pp. 153-170.
-
(2009)
Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Domingo-Ferrer, J.5
-
17
-
-
33749993205
-
Constant-size dynamic k-TAA
-
M. H. Au, W. Susilo, and Y. Mu, "Constant-size dynamic k-TAA," in Proc. Int. Conf. Secur. Cryptography Netw., 2006, pp. 111-125.
-
(2006)
Proc. Int. Conf. Secur. Cryptography Netw.
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
19
-
-
84874343441
-
A privacy-preserving reputation system for participatory sensing
-
K. L. Huang, S. S. Kanhere, and W. Hu, "A privacy-preserving reputation system for participatory sensing," in Proc. 37th Annu. IEEE Conf. Local Comput. Netw., 2012, pp. 10-18.
-
(2012)
Proc. 37th Annu. IEEE Conf. Local Comput. Netw.
, pp. 10-18
-
-
Huang, K.L.1
Kanhere, S.S.2
Hu, W.3
-
20
-
-
84908518704
-
Enabling reputation and trust in privacy-preserving mobile sensing
-
Dec
-
X. O. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher, "Enabling reputation and trust in privacy-preserving mobile sensing," IEEE Trans. Mobile Comput., vol. 13, no. 12, pp. 2777-2790, Dec. 2014.
-
(2014)
IEEE Trans. Mobile Comput.
, vol.13
, Issue.12
, pp. 2777-2790
-
-
Wang, X.O.1
Cheng, W.2
Mohapatra, P.3
Abdelzaher, T.4
-
21
-
-
84893485211
-
GeoTruCrowd: Trustworthy query answering with spatial crowdsourcing
-
L. Kazemi, C. Shahabi, and L. Chen, "GeoTruCrowd: Trustworthy query answering with spatial crowdsourcing," in Proc. ACM SIGSPATIAL Int. Conf. Advances Geographic Inf. Syst., 2013, pp. 314-323.
-
(2013)
Proc. ACM SIGSPATIAL Int. Conf. Advances Geographic Inf. Syst.
, pp. 314-323
-
-
Kazemi, L.1
Shahabi, C.2
Chen, L.3
-
23
-
-
84964853686
-
Towards preserving worker location privacy in spatial crowdsourcing
-
Y. Shen, L. Huang, L. Li, X. Lu, S. Wang, and W. Yang, "Towards preserving worker location privacy in spatial crowdsourcing," in Proc. IEEE Global Commun. Conf., 2015, pp. 1-6.
-
(2015)
Proc. IEEE Global Commun. Conf.
, pp. 1-6
-
-
Shen, Y.1
Huang, L.2
Li, L.3
Lu, X.4
Wang, S.5
Yang, W.6
-
24
-
-
84960857721
-
CCS-TA: Quality-guaranteed online task allocation in compressive crowdsensing
-
L. Wang, et al., "CCS-TA: Quality-guaranteed online task allocation in compressive crowdsensing," in Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput., 2015, pp. 683-694.
-
(2015)
Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput.
, pp. 683-694
-
-
Wang, L.1
-
25
-
-
84929152831
-
EEMC: Enabling energy-efficient mobile crowdsensing with anonymous participants
-
H. Xiong, D. Zhang, L. Wang, J. P. Gibson, and J. Zhu, "EEMC: Enabling energy-efficient mobile crowdsensing with anonymous participants," ACM Trans. Intell. Syst. Technol., vol. 6, no. 3, 2015, Art. no. 39.
-
(2015)
ACM Trans. Intell. Syst. Technol.
, vol.6
, Issue.3
-
-
Xiong, H.1
Zhang, D.2
Wang, L.3
Gibson, J.P.4
Zhu, J.5
-
26
-
-
85030453076
-
Energy-aware participant selection for smartphone-enabled mobile crowd sensing
-
Sep
-
C. Liu, B. Zhang, X. Su, J. Ma, W. Wang, and K. K. Leung, "Energy-aware participant selection for smartphone-enabled mobile crowd sensing," IEEE Syst. J., vol. 11, no. 3, pp. 1435-1446, Sep. 2017.
-
(2017)
IEEE Syst. J.
, vol.11
, Issue.3
, pp. 1435-1446
-
-
Liu, C.1
Zhang, B.2
Su, X.3
Ma, J.4
Wang, W.5
Leung, K.K.6
-
27
-
-
84978286005
-
ICrowd: Near optimal task allocation for piggyback crowdsensing
-
Aug
-
H. Xiong, D. Zhang, G. Chen, L. Wang, C. Gauthier, and L. E. Barnes, "iCrowd: Near optimal task allocation for piggyback crowdsensing," IEEE. Trans. Mobile Comput., vol. 15, no. 8, pp. 2010-2022, Aug. 2016.
-
(2016)
IEEE. Trans. Mobile Comput.
, vol.15
, Issue.8
, pp. 2010-2022
-
-
Xiong, H.1
Zhang, D.2
Chen, G.3
Wang, L.4
Gauthier, C.5
Barnes, L.E.6
-
29
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
May
-
J. Li, Y. K. Li, X. Chen, P. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.4
Lou, W.5
-
30
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Jun
-
J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615-1625, Jun. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.5
Lou, W.6
-
31
-
-
84957709790
-
Secure data deduplication with reliable key management for dynamic updates in CPSs
-
Dec
-
M. Wen, K. Ota, H. Li, J. Lei, C. Gu, and Z. Su, "Secure data deduplication with reliable key management for dynamic updates in CPSs," IEEE Trans. Comput. Social Syst., vol. 2, no. 4, pp. 137-147, Dec. 2015.
-
(2015)
IEEE Trans. Comput. Social Syst.
, vol.2
, Issue.4
, pp. 137-147
-
-
Wen, M.1
Ota, K.2
Li, H.3
Lei, J.4
Gu, C.5
Su, Z.6
-
32
-
-
84954136616
-
Secure deduplication of encrypted data without additional independent servers
-
J. Liu, N. Asokan, and B. Pinkas, "Secure deduplication of encrypted data without additional independent servers," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 874-885.
-
(2015)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 874-885
-
-
Liu, J.1
Asokan, N.2
Pinkas, B.3
-
33
-
-
84983247032
-
Enabling secure and effective near-duplicate detection over encrypted in-network storage
-
H. Cui, X. Yuan, Y. Zheng, and C. Wang, "Enabling secure and effective near-duplicate detection over encrypted in-network storage," in Proc. IEEE INFOCOM, 2016, pp. 1-9.
-
(2016)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Cui, H.1
Yuan, X.2
Zheng, Y.3
Wang, C.4
-
34
-
-
85027489346
-
Toward encrypted cloud media center with secure deduplication
-
Feb
-
Y. Zheng, X. Yuan, X. Wang, J. Jiang, C. Wang, and X. Gui, "Toward encrypted cloud media center with secure deduplication," IEEE Trans. Multimedia, vol. 19, no. 2, pp. 251-265, Feb. 2017.
-
(2017)
IEEE Trans. Multimedia
, vol.19
, Issue.2
, pp. 251-265
-
-
Zheng, Y.1
Yuan, X.2
Wang, X.3
Jiang, J.4
Wang, C.5
Gui, X.6
-
35
-
-
85015396702
-
Secure and deduplicated spatial crowdsourcing: A fog-based approach
-
J. Ni, X. Lin, K. Zhang, and Y. Yu, "Secure and deduplicated spatial crowdsourcing: A fog-based approach," in Proc. IEEE Global Commun. Conf., 2016, pp. 1-6.
-
(2016)
Proc. IEEE Global Commun. Conf.
, pp. 1-6
-
-
Ni, J.1
Lin, X.2
Zhang, K.3
Yu, Y.4
-
36
-
-
84975226279
-
Protecting mobile crowd sensing against Sybil attacks using cloud based trust management system
-
S. Chang and Z. Chen, "Protecting mobile crowd sensing against Sybil attacks using cloud based trust management system," Mobile Inf. Syst., vol. 2016, 2016, pp. 1-9.
-
(2016)
Mobile Inf. Syst.
, vol.2016
, pp. 1-9
-
-
Chang, S.1
Chen, Z.2
-
37
-
-
84893397951
-
Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study
-
Jan
-
A. Faggiani, E. Gregori, L. Lenzini, V. Luconi, and A. Vecchio, "Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study," IEEE Commun. Mag., vol. 52, no. 1, pp. 106-113, Jan. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.1
, pp. 106-113
-
-
Faggiani, A.1
Gregori, E.2
Lenzini, L.3
Luconi, V.4
Vecchio, A.5
-
38
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," in Proc. Netw. Distrib. Syst. Secur. Symp., 2005, pp. 29-43.
-
(2005)
Proc. Netw. Distrib. Syst. Secur. Symp.
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
40
-
-
84958612917
-
Efficient group signature schemes for large group (extended abstract)
-
J. Camenisch and M. Stadler, "Efficient group signature schemes for large group (extended abstract)," in Proc. Annu. Int. Cryptology Conf., 1997, pp. 410-424.
-
(1997)
Proc. Annu. Int. Cryptology Conf.
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
41
-
-
77951164538
-
-
Jan
-
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, "CRAWDAD trace cambridge/haggle/imote/infocom," [Online] . Available: https://crawdad.org/cambridge/haggle/20060131/, Jan. 2006.
-
(2006)
CRAWDAD Trace Cambridge/haggle/imote/infocom
-
-
Scott, J.1
Gass, R.2
Crowcroft, J.3
Hui, P.4
Diot, C.5
Chaintreau, A.6
-
42
-
-
85049749368
-
Exploiting social network to enhance human-to-human infection analysis without privacy leakage
-
Nov
-
K. Zhang, X. Liang, J. Ni, K. Yang, and X. Shen, "Exploiting social network to enhance human-to-human infection analysis without privacy leakage," IEEE Trans. Depend. Sec., Nov. 2016, doi: 10.1109/TDSC.2016.2626288
-
(2016)
IEEE Trans. Depend. Sec.
-
-
Zhang, K.1
Liang, X.2
Ni, J.3
Yang, K.4
Shen, X.5
|