-
1
-
-
84941085241
-
Internet of Things: A survey on enabling technologies, protocols, and applications
-
4th Quart
-
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications, " IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts
, vol.17
, Issue.4
, pp. 2347-2376
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
2
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbia, R. Buyyab, S. Marusica, and M. Palaniswamia, "Internet of Things (IoT): A vision, architectural elements, and future directions, " Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Gener. Comput. Syst
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbia, J.1
Buyyab, R.2
Marusica, S.3
Palaniswamia, M.4
-
3
-
-
84866409323
-
-
Cisco, San Jose, CA, USA, White Paper
-
D. Evans, "The Internet of Things: How the next evolution of the Internet is changing everything, " Cisco, San Jose, CA, USA, White Paper, 2011.
-
(2011)
The Internet of Things: How the Next Evolution of the Internet Is Changing Everything
-
-
Evans, D.1
-
4
-
-
85042693239
-
-
Bus. Insider, New York, NY, USA
-
J. Camhi, Former Cisco CEO John Chambers Predicts 500 Billion Connected Devices by 2025, Bus. Insider, New York, NY, USA, 2015.
-
(2015)
Former Cisco CEO John Chambers Predicts 500 Billion Connected Devices by 2025
-
-
Camhi, J.1
-
5
-
-
84880910863
-
-
Cisco, San Jose, CA, USA, White Paper
-
Cisco Global Cloud Index: Forecast and Methodology, 2014-2019, Cisco, San Jose, CA, USA, White Paper, 2014.
-
(2014)
Cisco Global Cloud Index: Forecast and Methodology, 2014-2019
-
-
-
6
-
-
85032690523
-
-
IDC FutureScape, Framingham, MA, USA
-
C. MacGillivray et al., IDC FutureScape: Worldwide Internet of Things 2016 Predictions, document US40755816, IDC FutureScape, Framingham, MA, USA, 2015.
-
(2015)
IDC FutureScape: Worldwide Internet of Things 2016 Predictions, Document US40755816
-
-
MacGillivray, C.1
-
7
-
-
84987842183
-
Edge computing: Vision and challenges
-
Oct
-
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges, " IEEE Internet Things J., vol. 3, no. 5, pp. 637-646, Oct. 2016.
-
(2016)
IEEE Internet Things J
, vol.3
, Issue.5
, pp. 637-646
-
-
Shi, W.1
Cao, J.2
Zhang, Q.3
Li, Y.4
Xu, L.5
-
8
-
-
84960151216
-
-
Cisco, San Jose, CA, USA, White Paper
-
"Fog computing and the Internet of Things: Extend the cloud to where the things are, " Cisco, San Jose, CA, USA, White Paper, 2015.
-
(2015)
Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
-
-
-
9
-
-
84996757871
-
Finding your way in the fog: Towards a comprehensive definition of fog computing
-
L. M. Vaquero and L. Rodero-Merino, "Finding your way in the fog: Towards a comprehensive definition of fog computing, " ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 27-32, 2014.
-
(2014)
ACM SIGCOMM Comput. Commun. Rev
, vol.44
, Issue.5
, pp. 27-32
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
-
10
-
-
85015215902
-
-
Cisco Blogs, San Jose, CA, USA
-
T. Zhang, Fog Boosts Capabilities to Add More Things Securely to the Internet, Cisco Blogs, San Jose, CA, USA, 2016.
-
(2016)
Fog Boosts Capabilities to Add More Things Securely to the Internet
-
-
Zhang, T.1
-
11
-
-
85015792124
-
-
Wikipedia. (2016). Fog Computing. [Online]. Available: https://en.wikipedia.org/wiki/Fog-computing
-
(2016)
Fog Computing
-
-
-
12
-
-
85008245198
-
Mobile edge computing fog et al.: A survey and analysis of security threats and challenges
-
Jan
-
R. Roman, J. Lopez, and M. Manbo, "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges, " Future Gener. Comput. Syst., vol. 78, pp. 680-698, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 680-698
-
-
Roman, R.1
Lopez, J.2
Manbo, M.3
-
13
-
-
84938672829
-
Security for the Internet of Things: A survey of existing protocols and open research issues
-
3rd Quart
-
J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things: A survey of existing protocols and open research issues, " IEEE Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294-1312, 3rd Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts
, vol.17
, Issue.3
, pp. 1294-1312
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
14
-
-
84940533844
-
Exploiting mobile social behaviors for Sybil detection
-
Hong Kong
-
K. Zhang, X. Liang, R. Lu, K. Yang, and X. S. Shen, "Exploiting mobile social behaviors for Sybil detection, " in Proc. INFOCOM, Hong Kong, 2015, pp. 271-279.
-
(2015)
Proc. INFOCOM
, pp. 271-279
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Yang, K.4
Shen, X.S.5
-
15
-
-
85015190263
-
Fog computing for the Internet of Things: Security and privacy issues
-
Mar./Apr
-
A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the Internet of Things: Security and privacy issues, " IEEE Internet Comput., vol. 21, no. 2, pp. 34-42, Mar./Apr. 2017.
-
(2017)
IEEE Internet Comput
, vol.21
, Issue.2
, pp. 34-42
-
-
Alrawais, A.1
Alhothaily, A.2
Hu, C.3
Cheng, X.4
-
16
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
Hangzhou, China
-
S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues, " in Proc. Mobidata, Hangzhou, China, 2015, pp. 37-42.
-
(2015)
Proc. Mobidata
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
17
-
-
84961589936
-
Theoretical modelling of fog computing: A green computing paradigm to support IoT applications
-
Mar
-
S. Sarkar and S. Misra, "Theoretical modelling of fog computing: A green computing paradigm to support IoT applications, " IET Netw., vol. 5, no. 2, pp. 23-29, Mar. 2016.
-
(2016)
IET Netw
, vol.5
, Issue.2
, pp. 23-29
-
-
Sarkar, S.1
Misra, S.2
-
18
-
-
85021802926
-
Feasibility of fog computing
-
B. Varghese, N. Wang, D. S. Nikolopoulos, and R. Buyya, "Feasibility of fog computing, " ArXiv Preprint, Tech. Rep., 2017. [Online]. Available: https://arxiv.org/pdf/1701.05451.pdf
-
(2017)
ArXiv Preprint, Tech. Rep
-
-
Varghese, B.1
Wang, N.2
Nikolopoulos, D.S.3
Buyya, R.4
-
19
-
-
84966662927
-
Assessment of the suitability of fog computing in the context of Internet of Things
-
to be published
-
S. Sarkar, S. Chatterjee, and S. Misra, "Assessment of the suitability of fog computing in the context of Internet of Things, " IEEE Trans. Cloud Comput., to be published.
-
IEEE Trans. Cloud Comput
-
-
Sarkar, S.1
Chatterjee, S.2
Misra, S.3
-
20
-
-
85018784068
-
RAINA: Reliability and adaptability in android for fog computing
-
Apr
-
K. Dantu, S. Y. Ko, and L. Ziarek, "RAINA: Reliability and adaptability in android for fog computing, " IEEE Commun. Mag., vol. 55, no. 4, pp. 41-45, Apr. 2017.
-
(2017)
IEEE Commun. Mag
, vol.55
, Issue.4
, pp. 41-45
-
-
Dantu, K.1
Ko, S.Y.2
Ziarek, L.3
-
22
-
-
85027022438
-
Fog computing for sustainable smart cities: A survey
-
C. Perera, Y. Qin, J. C. Estrella, S. Reiff-Marganiec, and A. V. Vasilakos, "Fog computing for sustainable smart cities: A survey, " ACM Comput. Surveys, vol. 50, no. 3, 2017, Art. no. 32.
-
(2017)
ACM Comput. Surveys
, vol.50
, Issue.3
-
-
Perera, C.1
Qin, Y.2
Estrella, J.C.3
Reiff-Marganiec, S.4
Vasilakos, A.V.5
-
23
-
-
85016275071
-
Foud: Integrating fog and cloud for 5G-enabled V2G networks
-
Mar./Apr
-
M. Tao, K. Ota, and M. Dong, "Foud: Integrating fog and cloud for 5G-enabled V2G networks, " IEEE Netw., vol. 31, no. 2, pp. 8-13, Mar./Apr. 2017.
-
(2017)
IEEE Netw
, vol.31
, Issue.2
, pp. 8-13
-
-
Tao, M.1
Ota, K.2
Dong, M.3
-
24
-
-
85028375282
-
EXEGESIS: Extreme edge resource harvesting for a virtualized fog environment
-
Jul
-
E. K. Markakis et al., "EXEGESIS: Extreme edge resource harvesting for a virtualized fog environment, " IEEE Commun. Mag., vol. 55, no. 7, pp. 173-179, Jul. 2017.
-
(2017)
IEEE Commun. Mag
, vol.55
, Issue.7
, pp. 173-179
-
-
Markakis, E.K.1
-
25
-
-
85042730676
-
-
ArXiv Preprint, Tech. Rep
-
H. Dubey et al., "Fog computing in medical Internet-of-Things: Architecture, implementation, and applications, " ArXiv Preprint, Tech. Rep., 2017. [Online]. Available: https://arxiv.org/pdf/1706.08012.pdf
-
(2017)
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications
-
-
Dubey, H.1
-
26
-
-
85012875280
-
Exploiting smart E-health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
-
Jan
-
A. M. Rahmani et al., "Exploiting smart E-health gateways at the edge of healthcare Internet-of-Things: A fog computing approach, " Future Gener. Comput. Syst., vol. 78, pp. 641-658, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 641-658
-
-
Rahmani, A.M.1
-
27
-
-
85028008668
-
Fog computing in healthcare - A review and discussion
-
F. A. Kraemer, A. E. Braten, N. Tamkittikhun, and D. Palma, "Fog computing in healthcare - A review and discussion, " IEEE Access, vol. 5, pp. 9206-9222, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 9206-9222
-
-
Kraemer, F.A.1
Braten, A.E.2
Tamkittikhun, N.3
Palma, D.4
-
28
-
-
85024260157
-
Cloud Computing
-
B. Hayes, "Cloud Computing, " Commun. ACM, vol. 51, no. 7, pp. 9-11, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.7
, pp. 9-11
-
-
Hayes, B.1
-
29
-
-
85019014090
-
Multiobjective optimization in cloud brokering systems for connected Internet of Things
-
Apr
-
T. Kumrai, K. Ota, M. Dong, J. Kishigami, and D. K. Sung, "Multiobjective optimization in cloud brokering systems for connected Internet of Things, " IEEE Internet Things J., vol. 4, no. 2, pp. 404-413, Apr. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.2
, pp. 404-413
-
-
Kumrai, T.1
Ota, K.2
Dong, M.3
Kishigami, J.4
Sung, D.K.5
-
30
-
-
84999748172
-
Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey
-
4th Quart
-
N. C. Luong et al., "Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey, " IEEE Commun. Surveys Tuts., vol. 18, no. 4, pp. 2546-2590, 4th Quart., 2016.
-
(2016)
IEEE Commun. Surveys Tuts
, vol.18
, Issue.4
, pp. 2546-2590
-
-
Luong, N.C.1
-
31
-
-
84958935292
-
Integration of cloud computing and Internet of Things: A survey
-
Mar
-
A. Botta, W. Donato, V. Persico, and A. Pescapé, "Integration of cloud computing and Internet of Things: A survey, " Future Gener. Comput. Syst., vol. 56, pp. 684-700, Mar. 2016.
-
(2016)
Future Gener. Comput. Syst
, vol.56
, pp. 684-700
-
-
Botta, A.1
Donato, W.2
Persico, V.3
Pescapé, A.4
-
32
-
-
84964790214
-
Radio access network virtualization for the social Internet of Things
-
Nov./Dec
-
H. Li, M. Dong, and K. Ota, "Radio access network virtualization for the social Internet of Things, " IEEE Cloud Comput., vol. 2, no. 6, pp. 42-50, Nov./Dec. 2015.
-
(2015)
IEEE Cloud Comput
, vol.2
, Issue.6
, pp. 42-50
-
-
Li, H.1
Dong, M.2
Ota, K.3
-
33
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Helsinki, Finland
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepali, "Fog computing and its role in the Internet of Things, " in Proc. MCC Workshop, Helsinki, Finland, 2012, pp. 13-16.
-
(2012)
Proc. MCC Workshop
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepali, S.4
-
34
-
-
84962284412
-
Developing IoT applications in the fog: A distributed dataflow approach
-
Seoul, South Korea
-
N. K. Giang, M. Blackstock, R. Lea, and V. C. M. Leung, "Developing IoT applications in the fog: A distributed dataflow approach, " in Proc. IOT, Seoul, South Korea, 2015, pp. 155-162.
-
(2015)
Proc. IOT
, pp. 155-162
-
-
Giang, N.K.1
Blackstock, M.2
Lea, R.3
Leung, V.C.M.4
-
35
-
-
85012170641
-
Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems
-
Oct
-
X. Masip-Bruin, E. Marín-Tordera, G. Tashakor, A. Jukan, and G.-J. Ren, "Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems, " IEEE Wireless Commun., vol. 23, no. 5, pp. 120-128, Oct. 2016.
-
(2016)
IEEE Wireless Commun
, vol.23
, Issue.5
, pp. 120-128
-
-
Masip-Bruin, X.1
Marín-Tordera, E.2
Tashakor, G.3
Jukan, A.4
Ren, G.-J.5
-
37
-
-
85010756872
-
An integrated architecture for software defined and virtualized radio access networks with fog computing
-
Jan./Feb
-
K. Liang, L. Zhao, X. Chu, and H.-H. Chen, "An integrated architecture for software defined and virtualized radio access networks with fog computing, " IEEE Netw., vol. 31, no. 1, pp. 80-87, Jan./Feb. 2017.
-
(2017)
IEEE Netw
, vol.31
, Issue.1
, pp. 80-87
-
-
Liang, K.1
Zhao, L.2
Chu, X.3
Chen, H.-H.4
-
38
-
-
85042698197
-
-
ArXiv Preprint, Tech. Rep
-
H. Zhang, Y. Qiu, X. Chu, K. Long, and V. Leung, "Fog radio access networks: Mobility management, interference mitigation and resource optimization, " ArXiv Preprint, Tech. Rep., 2017. [Online]. Available: https://arxiv.org/pdf/1707.06892.pdf
-
(2017)
Fog Radio Access Networks: Mobility Management, Interference Mitigation and Resource Optimization
-
-
Zhang, H.1
Qiu, Y.2
Chu, X.3
Long, K.4
Leung, V.5
-
39
-
-
85031320785
-
Catalyzing cloudfog interoperation in 5G wireless networks: An SDN approach
-
Sep
-
P. Yang, N. Zhang, Y. Bi, L. Yu, and X. S. Shen, "Catalyzing cloudfog interoperation in 5G wireless networks: An SDN approach, " IEEE Netw., vol. 31, no. 5, pp. 14-20, Sep. 2017.
-
(2017)
IEEE Netw
, vol.31
, Issue.5
, pp. 14-20
-
-
Yang, P.1
Zhang, N.2
Bi, Y.3
Yu, L.4
Shen, X.S.5
-
40
-
-
84950986038
-
Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing
-
Hangzhou, China
-
Y. Cao, P. Hou, D. Brown, J. Wang, and S. Chen, "Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing, " in Proc. Mobidata, Hangzhou, China, 2015, pp. 43-48.
-
(2015)
Proc. Mobidata
, pp. 43-48
-
-
Cao, Y.1
Hou, P.2
Brown, D.3
Wang, J.4
Chen, S.5
-
41
-
-
84963780985
-
Energy management-as-aservice over fog computing platform
-
Apr
-
M. A. A. Faruque and K. Vatanparvar, "Energy management-as-aservice over fog computing platform, " IEEE Internet Things J., vol. 3, no. 2, pp. 161-169, Apr. 2016.
-
(2016)
IEEE Internet Things J
, vol.3
, Issue.2
, pp. 161-169
-
-
Faruque, M.A.A.1
Vatanparvar, K.2
-
42
-
-
84988849458
-
Priority control based on website categories in edge computing
-
San Francisco, CA, USA
-
N. Kamiyama et al., "Priority control based on website categories in edge computing, " in Proc. IEEE INFOCOM WKSHPS, San Francisco, CA, USA, 2016, pp. 776-781.
-
(2016)
Proc. IEEE INFOCOM WKSHPS
, pp. 776-781
-
-
Kamiyama, N.1
-
43
-
-
84969922595
-
The promise of edge computing
-
May
-
W. Shi and S. Dustdar, "The promise of edge computing, " Computers, vol. 49, no. 5, pp. 78-81, May 2016.
-
(2016)
Computers
, vol.49
, Issue.5
, pp. 78-81
-
-
Shi, W.1
Dustdar, S.2
-
44
-
-
85028360031
-
Mobile edge computing: A survey on architecture and computation offloading
-
3rd Quart
-
P. Mach and Z. Becvar, "Mobile edge computing: A survey on architecture and computation offloading, " IEEE Commun. Surveys Tuts., vol. 19, no. 3, pp. 1628-1656, 3rd Quart., 2017.
-
(2017)
IEEE Commun. Surveys Tuts
, vol.19
, Issue.3
, pp. 1628-1656
-
-
Mach, P.1
Becvar, Z.2
-
45
-
-
85042709608
-
How can edge computing benefit from software-defined networking: A survey, use cases & future directions
-
to be published
-
A. C. Baktir, A. Ozgovde, and C. Ersoy, "How can edge computing benefit from software-defined networking: A survey, use cases & future directions, " IEEE Commun. Surveys Tuts., to be published.
-
IEEE Commun. Surveys Tuts
-
-
Baktir, A.C.1
Ozgovde, A.2
Ersoy, C.3
-
46
-
-
85018950987
-
Clarifying fog computing and networking: 10 questions and answers
-
Apr
-
M. Chiang, S. Ha, I. Chih-Lin, F. Risso, and T. Zhang, "Clarifying fog computing and networking: 10 questions and answers, " IEEE Commun. Mag., vol. 55, no. 4, pp. 18-20, Apr. 2017.
-
(2017)
IEEE Commun. Mag
, vol.55
, Issue.4
, pp. 18-20
-
-
Chiang, M.1
Ha, S.2
Chih-Lin, I.3
Risso, F.4
Zhang, T.5
-
47
-
-
85018975973
-
Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges
-
Apr
-
T. X. Tran, A. Hajisami, P. Pandey, and D. Pompili, "Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges, " IEEE Commun. Mag., vol. 55, no. 4, pp. 54-61, Apr. 2017.
-
(2017)
IEEE Commun. Mag
, vol.55
, Issue.4
, pp. 54-61
-
-
Tran, T.X.1
Hajisami, A.2
Pandey, P.3
Pompili, D.4
-
48
-
-
84921403194
-
Smart human security framework using Internet of Things, cloud and fog computing
-
New Delhi, India
-
V. K. Sehgal, A. Patrick, A. Soni, and L. Rajput, "Smart human security framework using Internet of Things, cloud and fog computing, " in Proc. Intell. Distrib. Comput., New Delhi, India, 2015, pp. 251-263.
-
(2015)
Proc. Intell. Distrib. Comput
, pp. 251-263
-
-
Sehgal, V.K.1
Patrick, A.2
Soni, A.3
Rajput, L.4
-
49
-
-
85014093576
-
A survey of standards for machine-to-machine and the Internet of Things
-
1st Quart
-
V. Gazis, "A survey of standards for machine-to-machine and the Internet of Things, " IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 482-511, 1st Quart., 2017.
-
(2017)
IEEE Commun. Surveys Tuts
, vol.19
, Issue.1
, pp. 482-511
-
-
Gazis, V.1
-
50
-
-
85016940214
-
Privacy-preserving real-time navigation system using vehicular crowdsourcing
-
Montreal, QC, Canada
-
J. Ni, X. Lin, K. Zhang, and X. Shen, "Privacy-preserving real-time navigation system using vehicular crowdsourcing, " in Proc. IEEE VTC Fall, Montreal, QC, Canada, 2016, pp. 1-5.
-
(2016)
Proc. IEEE VTC Fall
, pp. 1-5
-
-
Ni, J.1
Lin, X.2
Zhang, K.3
Shen, X.4
-
51
-
-
84944316909
-
Crowd map: Accurate reconstruction of indoor floor plans from crowdsourced sensor-rich videos
-
Columbus, OH, USA
-
S. Chen, M. Li, K. Ren, and C. Qiao, "Crowd map: Accurate reconstruction of indoor floor plans from crowdsourced sensor-rich videos, " in Proc. ICDCS, Columbus, OH, USA, 2015, pp. 1-10.
-
(2015)
Proc. ICDCS
, pp. 1-10
-
-
Chen, S.1
Li, M.2
Ren, K.3
Qiao, C.4
-
52
-
-
85042717818
-
Extending the cloud with fog: Security challenges and opportunities
-
Savannah, GA, USA
-
J. Shropshire, "Extending the cloud with fog: Security challenges and opportunities, " in Proc. Inf. Syst., Savannah, GA, USA, 2014, pp. 1-10.
-
(2014)
Proc. Inf. Syst
, pp. 1-10
-
-
Shropshire, J.1
-
53
-
-
85007504286
-
Mobile edge computing: Opportunities, solutions, and challenges
-
May
-
E. Ahmed and M. H. Rehmani, "Mobile edge computing: Opportunities, solutions, and challenges, " Future Gener. Comput. Syst., vol. 70, pp. 59-63, May 2017.
-
(2017)
Future Gener. Comput. Syst
, vol.70
, pp. 59-63
-
-
Ahmed, E.1
Rehmani, M.H.2
-
54
-
-
84976371915
-
Fog computing may help to save energy in cloud computing
-
May
-
F. Jalali, K. Hinton, R. Ayre, T. Alpcan, and P. S. Tucker, "Fog computing may help to save energy in cloud computing, " IEEE J. Sel. Areas Commun., vol. 34, no. 5, pp. 1728-1739, May 2016.
-
(2016)
IEEE J. Sel. Areas Commun
, vol.34
, Issue.5
, pp. 1728-1739
-
-
Jalali, F.1
Hinton, K.2
Ayre, R.3
Alpcan, T.4
Tucker, P.S.5
-
55
-
-
84979609826
-
Fog-computing-based radio access networks: Issues and challenges
-
Jul./Aug
-
M. Peng, S. Yan, K. Zhang, and C. Wang, "Fog-computing-based radio access networks: Issues and challenges, " IEEE Netw., vol. 30, no. 4, pp. 46-53, Jul./Aug. 2016.
-
(2016)
IEEE Netw
, vol.30
, Issue.4
, pp. 46-53
-
-
Peng, M.1
Yan, S.2
Zhang, K.3
Wang, C.4
-
56
-
-
85027525319
-
-
ArXiv Preprint, Tech. Rep
-
A. Munir, P. Kansakar, and S. U. Khan, "IFCIoT: Integrated fog cloud IoT architectural paradigm for future Internet of Things, " ArXiv Preprint, Tech. Rep., 2017. [Online]. Available: https://arxiv.org/pdf/1701.08474.pdf
-
(2017)
IFCIoT: Integrated Fog Cloud IoT Architectural Paradigm for Future Internet of Things
-
-
Munir, A.1
Kansakar, P.2
Khan, S.U.3
-
58
-
-
84986211321
-
Fog computing: Helping the Internet of Things realize its potential
-
Aug
-
A. V. Dastjerdi and R. Buyya, "Fog computing: Helping the Internet of Things realize its potential, " Computers, vol. 49, no. 8, pp. 112-116, Aug. 2016.
-
(2016)
Computers
, vol.49
, Issue.8
, pp. 112-116
-
-
Dastjerdi, A.V.1
Buyya, R.2
-
59
-
-
84962802418
-
Rise of the indoor crowd: Reconstruction of building interior view via mobile crowdsourcing
-
Seoul, South Korea
-
S. Chen, M. Li, K. Ren, X. Fu, and C. Qiao, "Rise of the indoor crowd: Reconstruction of building interior view via mobile crowdsourcing, " in Proc. ACM SenSys, Seoul, South Korea, 2015, pp. 59-71.
-
(2015)
Proc. ACM SenSys
, pp. 59-71
-
-
Chen, S.1
Li, M.2
Ren, K.3
Fu, X.4
Qiao, C.5
-
60
-
-
85041468373
-
-
ArXiv Preprint, Tech. Rep
-
H. Gupta, S. B. Nath, S. Chakraborty, and S. K. Ghosh, "SDFog: A software defined computing architecture for QoS aware service orchestration over edge devices, " ArXiv Preprint, Tech. Rep., 2017. [Online]. Available: https://arxiv.org/pdf/1609.01190.pdf
-
(2017)
SDFog: A Software Defined Computing Architecture for QoS Aware Service Orchestration over Edge Devices
-
-
Gupta, H.1
Nath, S.B.2
Chakraborty, S.3
Ghosh, S.K.4
-
61
-
-
77954592983
-
An intelligent secure and privacypreserving parking scheme through vehicular communications
-
Jul
-
R. Lu, X. Lin, H. Zhu, and X. Shen, "An intelligent secure and privacypreserving parking scheme through vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 6, pp. 2772-2784, Jul. 2010.
-
(2010)
IEEE Trans. Veh. Technol
, vol.59
, Issue.6
, pp. 2772-2784
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
-
62
-
-
85042711735
-
Cloud-based privacypreserving parking navigation through vehicular communications
-
Guangzhou, China
-
J. Ni, K. Zhang, X. Lin, Y. Yu, and X. Shen, "Cloud-based privacypreserving parking navigation through vehicular communications, " in Proc. SecureComm, Guangzhou, China, 2016, pp. 85-103.
-
(2016)
Proc. SecureComm
, pp. 85-103
-
-
Ni, J.1
Zhang, K.2
Lin, X.3
Yu, Y.4
Shen, X.5
-
63
-
-
85042723717
-
-
Cisco Blogs, San Jose, CA, USA
-
T. Zhang, Malware Defense Is a Team Sport, Best Played by Collaborative Fog Nodes, Cisco Blogs, San Jose, CA, USA, 2016.
-
(2016)
Malware Defense Is A Team Sport, Best Played by Collaborative Fog Nodes
-
-
Zhang, T.1
-
64
-
-
85029592539
-
Computation offloading and resource allocation in wireless cellular networks with mobile edge computing
-
Aug
-
C. Wang, C. Liang, F. R. Yu, Q. Chen, and L. Tang, "Computation offloading and resource allocation in wireless cellular networks with mobile edge computing, " IEEE Trans. Wireless Commun., vol. 16, no. 8, pp. 4924-4938, Aug. 2017.
-
(2017)
IEEE Trans. Wireless Commun
, vol.16
, Issue.8
, pp. 4924-4938
-
-
Wang, C.1
Liang, C.2
Yu, F.R.3
Chen, Q.4
Tang, L.5
-
65
-
-
84992727011
-
Mobile-edge computing: Partial computation offloading using dynamic voltage scaling
-
Oct
-
Y. Wang, M. Sheng, X. Wang, L. Wang, and J. Li, "Mobile-edge computing: Partial computation offloading using dynamic voltage scaling, " IEEE Trans. Commun., vol. 64, no. 10, pp. 4268-4282, Oct. 2016.
-
(2016)
IEEE Trans. Commun
, vol.64
, Issue.10
, pp. 4268-4282
-
-
Wang, Y.1
Sheng, M.2
Wang, X.3
Wang, L.4
Li, J.5
-
66
-
-
84875259808
-
Server-aided signatures verification secure against collusion attack
-
S. S. M. Chow, M. H. Au, and W. Susilo, "Server-aided signatures verification secure against collusion attack, " Inf. Security Tech. Rep., vol. 17, no. 3, pp. 46-57, 2013.
-
(2013)
Inf. Security Tech. Rep
, vol.17
, Issue.3
, pp. 46-57
-
-
Chow, S.S.M.1
Au, M.H.2
Susilo, W.3
-
67
-
-
84861959172
-
Privacypreserving public auditing for secure cloud storage
-
Feb
-
C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage, " IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Comput
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
68
-
-
85009971482
-
Security and privacy in smart city applications: Challenges and solutions
-
Jan
-
K. Zhang et al., "Security and privacy in smart city applications: Challenges and solutions, " IEEE Commun. Mag., vol. 55, no. 1, pp. 122-129, Jan. 2017.
-
(2017)
IEEE Commun. Mag
, vol.55
, Issue.1
, pp. 122-129
-
-
Zhang, K.1
-
69
-
-
85042701451
-
Smart Home Devices Used As Weapons in Website Attack
-
London, U.K., Oct
-
Smart Home Devices Used As Weapons in Website Attack, BBC News, London, U.K., Oct. 2016. [Online]. Available: www.bbc.com/news/technology-37738823
-
(2016)
BBC News
-
-
-
71
-
-
85042704142
-
A shared parking model in vehicular network using fog and cloud environment
-
Busan, South Korea
-
O. T. T. Kim, N. D. Tri, V. D. Nguyen, N. H. Tran, and C. S. Hong, "A shared parking model in vehicular network using fog and cloud environment, " in Proc. APNOMS, Busan, South Korea, 2015, pp. 1-6.
-
(2015)
Proc. APNOMS
, pp. 1-6
-
-
Kim, O.T.T.1
Tri, N.D.2
Nguyen, V.D.3
Tran, N.H.4
Hong, C.S.5
-
72
-
-
85021672640
-
A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing
-
Jun
-
S. Basudan, X. Lin, and K. Sankaranarayanan, "A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing, " IEEE Internet Things J., vol. 4, no. 3, pp. 772-782, Jun. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.3
, pp. 772-782
-
-
Basudan, S.1
Lin, X.2
Sankaranarayanan, K.3
-
73
-
-
85027883140
-
SCoP: Smartphone energy saving by merging push services in fog computing
-
S. Gao, Z. Peng, B. Xiao, Q. Xiao, and Y. Song, "SCoP: Smartphone energy saving by merging push services in fog computing, " in Proc. IWQoS, 2017, pp. 1-10.
-
(2017)
Proc. IWQoS
, pp. 1-10
-
-
Gao, S.1
Peng, Z.2
Xiao, B.3
Xiao, Q.4
Song, Y.5
-
74
-
-
85042714143
-
Fog computing in healthcare Internet of Things: A case study on ECG feature extraction
-
Liverpool, U.K.
-
T. N. Gia et al., "Fog computing in healthcare Internet of Things: A case study on ECG feature extraction, " in Proc. CIT/IUCC/DASC/PICOM, Liverpool, U.K., 2015, pp. 1-8.
-
(2015)
Proc. CIT/IUCC/DASC/PICOM
, pp. 1-8
-
-
Gia, T.N.1
-
75
-
-
85028437162
-
Security, privacy, and fairness in fog-based vehicular crowdsensing
-
Jun
-
J. Ni, A. Zhang, X. Lin, and X. S. Shen, "Security, privacy, and fairness in fog-based vehicular crowdsensing, " IEEE Commun. Mag., vol. 55, no. 6, pp. 146-152, Jun. 2017.
-
(2017)
IEEE Commun. Mag
, vol.55
, Issue.6
, pp. 146-152
-
-
Ni, J.1
Zhang, A.2
Lin, X.3
Shen, X.S.4
-
76
-
-
85042709029
-
E-HAMC: Leveraging fog computing for emergency alert service
-
St. Louis, MO, USA
-
M. Aazam and E.-N. Huh, "E-HAMC: Leveraging fog computing for emergency alert service, " in Proc. PerCom Workshops, St. Louis, MO, USA, 2015, pp. 1-6.
-
(2015)
Proc. PerCom Workshops
, pp. 1-6
-
-
Aazam, M.1
Huh, E.-N.2
-
77
-
-
85032360849
-
Fogempowered anomaly detection in IoT using hyperellipsoidal clustering
-
Oct
-
L. Lyu, J. Jin, S. Rajasegarar, X. He, and M. Palaniswami, "Fogempowered anomaly detection in IoT using hyperellipsoidal clustering, " IEEE Internet Things J., vol. 4, no. 5, pp. 1174-1184, Oct. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.5
, pp. 1174-1184
-
-
Lyu, L.1
Jin, J.2
Rajasegarar, S.3
He, X.4
Palaniswami, M.5
-
78
-
-
85037059583
-
LoDPD: A location differencebased proximity detection protocol for fog computing
-
Oct
-
Y. Huo, C. Hu, X. Qi, and T. Jing, "LoDPD: A location differencebased proximity detection protocol for fog computing, " IEEE Internet Things J., vol. 4, no. 5, pp. 1117-1124, Oct. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.5
, pp. 1117-1124
-
-
Huo, Y.1
Hu, C.2
Qi, X.3
Jing, T.4
-
79
-
-
85021436057
-
Position based cryptography with location privacy: A step for fog computing
-
Jan
-
R. Yang et al., "Position based cryptography with location privacy: A step for fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 799-806, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 799-806
-
-
Yang, R.1
-
80
-
-
85018184618
-
Exploring fog computing-based adaptive vehicular data scheduling policies through a compositional formal method - PEPA
-
Apr
-
X. Chen and L. Wang, "Exploring fog computing-based adaptive vehicular data scheduling policies through a compositional formal method - PEPA, " IEEE Commun. Lett., vol. 21, no. 4, pp. 745-748, Apr. 2017.
-
(2017)
IEEE Commun. Lett
, vol.21
, Issue.4
, pp. 745-748
-
-
Chen, X.1
Wang, L.2
-
81
-
-
84884572913
-
Securing m-healthcare social networks: Challenges, countermeasures and future directions
-
Aug
-
J. Zhou, Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos, "Securing m-healthcare social networks: Challenges, countermeasures and future directions, " IEEE Wireless Commun., vol. 20, no. 4, pp. 12-21, Aug. 2013.
-
(2013)
IEEE Wireless Commun
, vol.20
, Issue.4
, pp. 12-21
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Lin, X.4
Vasilakos, A.V.5
-
82
-
-
77649169684
-
Resource-aware secure ECG healthcare monitoring through body sensor networks
-
Feb
-
H. Wang et al., "Resource-aware secure ECG healthcare monitoring through body sensor networks, " IEEE Wireless Commun., vol. 17, no. 1, pp. 12-19, Feb. 2010.
-
(2010)
IEEE Wireless Commun
, vol.17
, Issue.1
, pp. 12-19
-
-
Wang, H.1
-
83
-
-
85029366507
-
Efficient and scalable query authentication for cloud-based storage systems with multiple data sources
-
Jul./Aug
-
S. Chandrasekhar and M. Singhal, "Efficient and scalable query authentication for cloud-based storage systems with multiple data sources, " IEEE Trans. Services Comput., vol. 10, no. 4, pp. 520-533, Jul./Aug. 2017.
-
(2017)
IEEE Trans. Services Comput
, vol.10
, Issue.4
, pp. 520-533
-
-
Chandrasekhar, S.1
Singhal, M.2
-
84
-
-
85014537568
-
Provably secure authenticated key agreement scheme for smart grid
-
to be published
-
V. Odelu, A. K. Das, M. Wazid, and M. Conti, "Provably secure authenticated key agreement scheme for smart grid, " IEEE Trans. Smart Grid, to be published.
-
IEEE Trans. Smart Grid
-
-
Odelu, V.1
Das, A.K.2
Wazid, M.3
Conti, M.4
-
85
-
-
84870429369
-
EMAP: Expedite message authentication protocol for vehicular ad hoc networks
-
Jan
-
A. Wasef and X. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks, " IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
-
(2013)
IEEE Trans. Mobile Comput
, vol.12
, Issue.1
, pp. 78-89
-
-
Wasef, A.1
Shen, X.2
-
86
-
-
85008263167
-
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
-
Dec
-
Q. Jiang et al., "An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks, " J. Netw. Comput. Appl., vol. 76, pp. 37-48, Dec. 2016.
-
(2016)
J. Netw. Comput. Appl
, vol.76
, pp. 37-48
-
-
Jiang, Q.1
-
87
-
-
85020469257
-
Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things
-
Oct
-
P. Hu et al., "Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things, " IEEE Internet Things J., vol. 4, no. 5, pp. 1143-1155, Oct. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.5
, pp. 1143-1155
-
-
Hu, P.1
-
88
-
-
85020858950
-
Securing SDN infrastructure of IoT-fog networks from MitM attacks
-
Oct
-
C. Li, Z. Qin, E. Novak, and Q. Li, "Securing SDN infrastructure of IoT-fog networks from MitM attacks, " IEEE Internet Things J., vol. 4, no. 5, pp. 1156-1164, Oct. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.5
, pp. 1156-1164
-
-
Li, C.1
Qin, Z.2
Novak, E.3
Li, Q.4
-
89
-
-
84884387687
-
Achieving efficient cooperative message authentication in vehicular ad hoc networks
-
Sep
-
X. Lin and X. Li, "Achieving efficient cooperative message authentication in vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 62, no. 7, pp. 3339-3348, Sep. 2013.
-
(2013)
IEEE Trans. Veh. Technol
, vol.62
, Issue.7
, pp. 3339-3348
-
-
Lin, X.1
Li, X.2
-
90
-
-
84929376476
-
PSMPA: Patient selfcontrollable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system
-
Jun
-
J. Zhou, X. Lin, X. Dong, and Z. Cao, "PSMPA: Patient selfcontrollable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1693-1703, Jun. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst
, vol.26
, Issue.6
, pp. 1693-1703
-
-
Zhou, J.1
Lin, X.2
Dong, X.3
Cao, Z.4
-
91
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
-
Jan
-
R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs, " IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, T.H.3
Liang, X.4
Shen, X.5
-
92
-
-
84959016733
-
Short randomizable signatures
-
San Francisco, CA, USA
-
D. Pointcheval and O. Sanders, "Short randomizable signatures, " in Proc. CT RSA, San Francisco, CA, USA, 2016, pp. 111-126.
-
(2016)
Proc. CT RSA
, pp. 111-126
-
-
Pointcheval, D.1
Sanders, O.2
-
93
-
-
29844444250
-
Incognito: Efficient full-domain K-anonymity
-
Baltimore, MD, USA
-
K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, "Incognito: Efficient full-domain K-anonymity, " in Proc. SIGMOD, Baltimore, MD, USA, 2005, pp. 49-60.
-
(2005)
Proc. SIGMOD
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
94
-
-
70449632682
-
De-anonymizing social networks
-
Berkeley, CA, USA
-
A. Narayanan and V. Shmatikov, "De-anonymizing social networks, " in Proc. IEEE S P, Berkeley, CA, USA, 2009, pp. 173-187.
-
(2009)
Proc. IEEE S P
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
95
-
-
85042733564
-
Access control issues in utilizing fog computing for transport infrastructure
-
S. Salonikias, I. Mavridis, and D. Gritzalis, "Access control issues in utilizing fog computing for transport infrastructure, " in Proc. CRITIS, 2015, pp. 15-26.
-
(2015)
Proc. CRITIS
, pp. 15-26
-
-
Salonikias, S.1
Mavridis, I.2
Gritzalis, D.3
-
96
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Tallinn, Estonia
-
A. Lewko and B. Waters, "Decentralizing attribute-based encryption, " in Proc. EUROCRYPT, Tallinn, Estonia, 2011, pp. 568-588.
-
(2011)
Proc. EUROCRYPT
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
97
-
-
85042708655
-
-
ZDNet, San Francisco, CA, USA
-
K. Hess, 10 BYOD Mobile Device Management Suites You Need to Know, ZDNet, San Francisco, CA, USA, 2012.
-
(2012)
10 BYOD Mobile Device Management Suites You Need to Know
-
-
Hess, K.1
-
98
-
-
84899413588
-
Going beyond mobile device management
-
P. Steiner, "Going beyond mobile device management, " Comput. Fraud Security, vol. 2014, no. 4, pp. 19-20, 2014.
-
(2014)
Comput. Fraud Security
, vol.2014
, Issue.4
, pp. 19-20
-
-
Steiner, P.1
-
99
-
-
84997770188
-
Device-invisible two-factor authenticated key agreement protocol for BYOD
-
Chengdu, China
-
J. Ni, X. Lin, K. Zhang, Y. Yu, and X. S. Shen, "Device-invisible two-factor authenticated key agreement protocol for BYOD, " in Proc. ICCC, Chengdu, China, 2016, pp. 1-6.
-
(2016)
Proc. ICCC
, pp. 1-6
-
-
Ni, J.1
Lin, X.2
Zhang, K.3
Yu, Y.4
Shen, X.S.5
-
100
-
-
85045645856
-
Towards fast and lightweight spam account detection in mobile social networks through tog computing
-
J. Zhang, Q. Li, X. Wang, B. Feng, and D. Guo, "Towards fast and lightweight spam account detection in mobile social networks through tog computing, " Peer Peer Netw. Appl., 2017.
-
(2017)
Peer Peer Netw. Appl
-
-
Zhang, J.1
Li, Q.2
Wang, X.3
Feng, B.4
Guo, D.5
-
102
-
-
85042698973
-
Final lightweight cryptography status report
-
"Final lightweight cryptography status report, " Eur. Netw. Excellence Cryptol. II, Tech. Rep., 2012. [Online]. Available: http://www.ecrypt.eu.org/ecrypt2/documents/D.SYM.12.pdf
-
(2012)
Eur. Netw. Excellence Cryptol. II, Tech. Rep
-
-
-
103
-
-
77954931494
-
Intrusion detection for grid and cloud computing
-
Jul./Aug
-
K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusion detection for grid and cloud computing, " IEEE IT Prof. Mag., vol. 12, no. 4, pp. 38-43, Jul./Aug. 2010.
-
(2010)
IEEE IT Prof. Mag
, vol.12
, Issue.4
, pp. 38-43
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.3
Westphall, C.4
-
104
-
-
84870672469
-
An abstract model for integrated intrusion detection and severity analysis for clouds
-
J. Xu, J. Arshad, and P. Townend, "An abstract model for integrated intrusion detection and severity analysis for clouds, " Int. J. Cloud Appl. Comput., vol. 1, no. 1, pp. 1-17, 2011.
-
(2011)
Int. J. Cloud Appl. Comput
, vol.1
, Issue.1
, pp. 1-17
-
-
Xu, J.1
Arshad, J.2
Townend, P.3
-
105
-
-
84870697197
-
Managing intrusion detection as a service in cloud networks
-
H. Hamad and M. A. Hoby, "Managing intrusion detection as a service in cloud networks, " Int. J. Comput. Appl., vol. 41, no. 1, pp. 35-40, 2012.
-
(2012)
Int. J. Comput. Appl
, vol.41
, Issue.1
, pp. 35-40
-
-
Hamad, H.1
Hoby, M.A.2
-
106
-
-
80052184968
-
A cloud-based intrusion detection and response system for mobile phones
-
A. Houmansadr, S. A. Zonouz, and R. Berthier, "A cloud-based intrusion detection and response system for mobile phones, " in Proc. DSNW, 2011, pp. 31-32.
-
(2011)
Proc. DSNW
, pp. 31-32
-
-
Houmansadr, A.1
Zonouz, S.A.2
Berthier, R.3
-
107
-
-
77949590054
-
Distributed intrusion detection in clouds using mobile agents
-
Sliema, Malta
-
A. V. Dastjerdi, K. A. Bakar, and S. G. H. Tabatabaei, "Distributed intrusion detection in clouds using mobile agents, " in Proc. ADVCOMP, Sliema, Malta, 2009, pp. 175-180.
-
(2009)
Proc. ADVCOMP
, pp. 175-180
-
-
Dastjerdi, A.V.1
Bakar, K.A.2
Tabatabaei, S.G.H.3
-
108
-
-
84870661024
-
Secure cloud computing based on mutual intrusion detection system
-
S. Ram, "Secure cloud computing based on mutual intrusion detection system, " Int. J. Comput. Appl., vol. 2, no. 1, pp. 57-67, 2012.
-
(2012)
Int. J. Comput. Appl
, vol.2
, Issue.1
, pp. 57-67
-
-
Ram, S.1
-
109
-
-
85013421978
-
Secure intelligent traffic light control using fog computing
-
Jan
-
J. Liu et al., "Secure intelligent traffic light control using fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 817-824, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 817-824
-
-
Liu, J.1
-
110
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Chicago, IL, USA
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM CCS, Chicago, IL, USA, 2009, pp. 21-32.
-
(2009)
Proc. ACM CCS
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
111
-
-
77953317298
-
Sybil attacks against mobile users: Friends and foes to the rescue
-
San Diego, CA, USA
-
D. Quercia and S. Hailes, "Sybil attacks against mobile users: Friends and foes to the rescue, " in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 336-340.
-
(2010)
Proc. IEEE INFOCOM
, pp. 336-340
-
-
Quercia, D.1
Hailes, S.2
-
112
-
-
84875667207
-
Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support
-
S. Park, B. Aslam, D. Turgut, and C. C. Zou, "Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support, " Security Commun. Netw., vol. 6, no. 4, pp. 523-538, 2013.
-
(2013)
Security Commun. Netw
, vol.6
, Issue.4
, pp. 523-538
-
-
Park, S.1
Aslam, B.2
Turgut, D.3
Zou, C.C.4
-
113
-
-
84902197946
-
LSR: Mitigating zero-day Sybil vulnerability in privacypreserving vehicular peer-to-peer networks
-
Sep
-
X. Lin, "LSR: Mitigating zero-day Sybil vulnerability in privacypreserving vehicular peer-to-peer networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 237-246, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
, pp. 237-246
-
-
Lin, X.1
-
114
-
-
84891775418
-
Enabling trustworthy service evaluation in service-oriented mobile social networks
-
Feb
-
X. Liang, X. Lin, and X. S. Shen, "Enabling trustworthy service evaluation in service-oriented mobile social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 310-320, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.2
, pp. 310-320
-
-
Liang, X.1
Lin, X.2
Shen, X.S.3
-
115
-
-
33947387917
-
Trust management in distributed systems
-
Feb
-
H. Li and M. Singhal, "Trust management in distributed systems, " IEEE Comput., vol. 40, no. 2, pp. 45-53, Feb. 2007.
-
(2007)
IEEE Comput
, vol.40
, Issue.2
, pp. 45-53
-
-
Li, H.1
Singhal, M.2
-
116
-
-
84899101836
-
A survey of multi-agent trust management systems
-
H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, "A survey of multi-agent trust management systems, " IEEE Access, vol. 1, pp. 35-50, 2013.
-
(2013)
IEEE Access
, vol.1
, pp. 35-50
-
-
Yu, H.1
Shen, Z.2
Leung, C.3
Miao, C.4
Lesser, V.R.5
-
117
-
-
84909606246
-
Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning
-
Nov
-
Z. Wei, H. Tang, F. R. Yu, M. Wang, and P. Mason, "Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning, " IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4647-4658, Nov. 2014.
-
(2014)
IEEE Trans. Veh. Technol
, vol.63
, Issue.9
, pp. 4647-4658
-
-
Wei, Z.1
Tang, H.2
Yu, F.R.3
Wang, M.4
Mason, P.5
-
118
-
-
85040585906
-
Toward architectural and protocol-level foundation for end-to-end trustworthiness in cloud/fog computing
-
to be published
-
Z. Su et al., "Toward architectural and protocol-level foundation for end-to-end trustworthiness in cloud/fog computing, " IEEE Trans. Big Data, to be published.
-
IEEE Trans. Big Data
-
-
Su, Z.1
-
119
-
-
33748767370
-
An entropy-based approach to protecting rating systems from unfair testimonies
-
Sep
-
J. Weng, C. Miao, and A. Goh, "An entropy-based approach to protecting rating systems from unfair testimonies, " IEICE Trans. Inf. Syst., vol. E89-D, no. 9, pp. 2502-2511, Sep. 2006.
-
(2006)
IEICE Trans. Inf. Syst
, vol.E89-D
, Issue.9
, pp. 2502-2511
-
-
Weng, J.1
Miao, C.2
Goh, A.3
-
120
-
-
84901027315
-
Trustworthiness management in the social Internet of Things
-
May
-
M. Nitti, R. Girau, and L. Atzori, "Trustworthiness management in the social Internet of Things, " IEEE Trans. Knowl. Data Eng., vol. 26, no. 5, pp. 1253-1266, May 2014.
-
(2014)
IEEE Trans. Knowl. Data Eng
, vol.26
, Issue.5
, pp. 1253-1266
-
-
Nitti, M.1
Girau, R.2
Atzori, L.3
-
121
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
4th Quart
-
J.-H. Cho, A. Swami, and I.-R. Chen, "A survey on trust management for mobile ad hoc networks, " IEEE Commun. Surveys Tuts., vol. 13, no. 4, pp. 562-583, 4th Quart., 2011.
-
(2011)
IEEE Commun. Surveys Tuts
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.-H.1
Swami, A.2
Chen, I.-R.3
-
122
-
-
84869449753
-
A reputationbased announcement scheme for VANETs
-
Nov
-
Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, "A reputationbased announcement scheme for VANETs, " IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4095-4108, Nov. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.9
, pp. 4095-4108
-
-
Li, Q.1
Malip, A.2
Martin, K.M.3
Ng, S.-L.4
Zhang, J.5
-
123
-
-
84896101663
-
Dynamic trust management for delay tolerant networks and its application to secure routing
-
May
-
I.-R. Chen, F. Bao, M. J. Chang, and J.-H. Cho, "Dynamic trust management for delay tolerant networks and its application to secure routing, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 5, pp. 1200-1210, May 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.5
, pp. 1200-1210
-
-
Chen, I.-R.1
Bao, F.2
Chang, M.J.3
Cho, J.-H.4
-
124
-
-
84930081899
-
SACRM: Social aware crowdsourcing with reputation management in mobile sensing
-
Jul
-
J. Ren, Y. Zhang, K. Zhang, and X. Shen, "SACRM: Social aware crowdsourcing with reputation management in mobile sensing, " Comput. Commun., vol. 65, pp. 55-65, Jul. 2015.
-
(2015)
Comput. Commun
, vol.65
, pp. 55-65
-
-
Ren, J.1
Zhang, Y.2
Zhang, K.3
Shen, X.4
-
125
-
-
84969847954
-
Twenty security considerations for cloud-supported Internet of Things
-
Jun
-
J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, "Twenty security considerations for cloud-supported Internet of Things, " IEEE Internet Things J., vol. 3, no. 3, pp. 269-284, Jun. 2015.
-
(2015)
IEEE Internet Things J
, vol.3
, Issue.3
, pp. 269-284
-
-
Singh, J.1
Pasquier, T.2
Bacon, J.3
Ko, H.4
Eyers, D.5
-
126
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
Apr./Jun
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward secure and dependable storage services in cloud computing, " IEEE Trans. Services Comput., vol. 5, no. 2, pp. 220-232, Apr./Jun. 2012.
-
(2012)
IEEE Trans. Services Comput
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
127
-
-
85014919981
-
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
-
Apr
-
Y. Yu et al., "Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage, " IEEE Trans. Inf. Forensics Security, vol. 12, no. 4, pp. 767-778, Apr. 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.4
, pp. 767-778
-
-
Yu, Y.1
-
128
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multicloud storage
-
Dec
-
Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multicloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231-2244, Dec. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Yu, M.4
-
129
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Espoo, Finland
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in Proc. EUROCRYPT, Espoo, Finland, 1998, pp. 127-144.
-
(1998)
Proc. EUROCRYPT
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
130
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, 2006.
-
(2006)
ACM Trans. Inf. Syst. Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
131
-
-
77952361637
-
Chosen-ciphertext secure proxy re-encryption
-
Alexandria, VA, USA
-
R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption, " in Proc. ACM CCS, Alexandria, VA, USA, 2007, pp. 185-194.
-
(2007)
Proc. ACM CCS
, pp. 185-194
-
-
Canetti, R.1
Hohenberger, S.2
-
132
-
-
77952320634
-
Conditional proxy re-encryption secure against chosen-ciphertext attack
-
Sydney, NSW, Australia
-
J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, "Conditional proxy re-encryption secure against chosen-ciphertext attack, " in Proc. ACM ASIACCS, Sydney, NSW, Australia, 2009, pp. 322-332.
-
(2009)
Proc. ACM ASIACCS
, pp. 322-332
-
-
Weng, J.1
Deng, R.H.2
Ding, X.3
Chu, C.-K.4
Lai, J.5
-
133
-
-
24944554962
-
Fuzzy identity-based encryption
-
Aarhus, Denmark
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption, " in Proc. EUROCRYPT, Aarhus, Denmark, 2005, pp. 457-473.
-
(2005)
Proc. EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
134
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption, " in Proc. IEEE S P, 2007, pp. 321-334.
-
(2007)
Proc. IEEE S P
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
135
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Alexandria, VA, USA
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. ACM CCS, Alexandria, VA, USA, 2006, pp. 89-98.
-
(2006)
Proc. ACM CCS
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
136
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
Chicago, IL, USA
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, " in Proc. ACM CCS, Chicago, IL, USA, 2010, pp. 735-737.
-
(2010)
Proc. ACM CCS
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
137
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
-
Jan
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
138
-
-
85028769994
-
An attribute-based encryption scheme to secure fog communications
-
A. Alrawais, A. Alhothaily, C. Hu, X. Xing, and X. Cheng, "An attribute-based encryption scheme to secure fog communications, " IEEE Access, vol. 5, pp. 9131-9138, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 9131-9138
-
-
Alrawais, A.1
Alhothaily, A.2
Hu, C.3
Xing, X.4
Cheng, X.5
-
139
-
-
85042685240
-
Attribute-based secure data sharing with efficient revocation in fog computing
-
A. Alotaibi, A. Barnawi, and M. Buhari, "Attribute-based secure data sharing with efficient revocation in fog computing, " Int. J. Inf. Security, vol. 8, no. 3, pp. 203-222, 2017.
-
(2017)
Int. J. Inf. Security
, vol.8
, Issue.3
, pp. 203-222
-
-
Alotaibi, A.1
Barnawi, A.2
Buhari, M.3
-
140
-
-
85011878988
-
Ciphertext-policy attributebased encryption against key-delegation abuse in fog computing
-
Jan
-
Y. Jiang, W. Susilo, Y. Mu, and F. Guo, "Ciphertext-policy attributebased encryption against key-delegation abuse in fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 720-729, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 720-729
-
-
Jiang, Y.1
Susilo, W.2
Mu, Y.3
Guo, F.4
-
141
-
-
85011802339
-
Towards leakageresilient fine-grained access control in fog computing
-
Jan
-
Z. Yu, M. H. Au, Q. Xu, R. Yang, and J. Han, "Towards leakageresilient fine-grained access control in fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 763-777, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 763-777
-
-
Yu, Z.1
Au, M.H.2
Xu, Q.3
Yang, R.4
Han, J.5
-
142
-
-
84891807562
-
Key-aggregate cryptosystem for scalable data sharing in cloud storage
-
Feb
-
C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, "Key-aggregate cryptosystem for scalable data sharing in cloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 468-477, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.2
, pp. 468-477
-
-
Chu, C.-K.1
Chow, S.S.M.2
Tzeng, W.-G.3
Zhou, J.4
Deng, R.H.5
-
143
-
-
84978741646
-
Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage
-
Aug
-
B. Cui, Z. Liu, and L. Wang, "Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage, " IEEE Trans. Comput., vol. 65, no. 8, pp. 2374-2385, Aug. 2014.
-
(2014)
IEEE Trans. Comput
, vol.65
, Issue.8
, pp. 2374-2385
-
-
Cui, B.1
Liu, Z.2
Wang, L.3
-
144
-
-
84959145270
-
Time-bound keyaggregate encryption for cloud storage
-
C.-C. Lee, C.-T. Li, S.-T. Chiu, and S.-D. Chen, "Time-bound keyaggregate encryption for cloud storage, " Security Commun. Netw., vol. 9, no. 13, pp. 2059-2069, 2016.
-
(2016)
Security Commun. Netw
, vol.9
, Issue.13
, pp. 2059-2069
-
-
Lee, C.-C.1
Li, C.-T.2
Chiu, S.-T.3
Chen, S.-D.4
-
145
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Prague, Czech Republic
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. EUROCRYPT, Prague, Czech Republic, 1999, pp. 223-238.
-
(1999)
Proc. EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
146
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Cambridge, MA, USA
-
D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts, " in Proc. TCC, Cambridge, MA, USA, 2005, pp. 325-341.
-
(2005)
Proc. TCC
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
147
-
-
84861649075
-
Fine-grained private matching for proximity-based mobile social networking
-
Orlando, FL, USA
-
R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. INFOCOM, Orlando, FL, USA, 2012, pp. 1969-1977.
-
(2012)
Proc. INFOCOM
, pp. 1969-1977
-
-
Zhang, R.1
Zhang, Y.2
Sun, J.3
Yan, G.4
-
148
-
-
84883345595
-
Fully anonymous profile matching in mobile social networks
-
Sep
-
X. Liang et al., "Fully anonymous profile matching in mobile social networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 641-655, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
, pp. 641-655
-
-
Liang, X.1
-
149
-
-
85029554588
-
Differentially private smart metering with fault tolerance and range-based filtering
-
Sep
-
J. Ni et al., "Differentially private smart metering with fault tolerance and range-based filtering, " IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2483-2493, Sep. 2017.
-
(2017)
IEEE Trans. Smart Grid
, vol.8
, Issue.5
, pp. 2483-2493
-
-
Ni, J.1
-
150
-
-
85018495637
-
A lightweight privacy-preserving data aggregation scheme for fog computingenhanced IoT
-
R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for fog computingenhanced IoT, " IEEE Access, vol. 5, pp. 3302-3312, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 3302-3312
-
-
Lu, R.1
Heung, K.2
Lashkari, A.H.3
Ghorbani, A.A.4
-
151
-
-
85014042880
-
Anonymous and secure aggregation scheme in fog-based public cloud computing
-
Jan
-
H. Wang, Z. Wang, and J. Domingo-Ferrer, "Anonymous and secure aggregation scheme in fog-based public cloud computing, " Future Gener. Comput. Syst., vol. 78, pp. 712-719, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 712-719
-
-
Wang, H.1
Wang, Z.2
Domingo-Ferrer, J.3
-
152
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Bethesda, MD, USA
-
C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc. STOC, Bethesda, MD, USA, 2009, pp. 169-178.
-
(2009)
Proc. STOC
, pp. 169-178
-
-
Gentry, C.1
-
153
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers, " in Proc. EUROCRYPT, 2010, pp. 24-43.
-
(2010)
Proc. EUROCRYPT
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
154
-
-
84983314455
-
Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing
-
San Francisco, CA, USA
-
G. Zhuo, Q. Jia, L. Guo, M. Li, and P. Li, "Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing, " in Proc. IEEE INFOCOM, San Francisco, CA, USA, 2016, pp. 1-9.
-
(2016)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Zhuo, G.1
Jia, Q.2
Guo, L.3
Li, M.4
Li, P.5
-
155
-
-
84929457217
-
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions
-
Apr
-
J. Zhou, Z. Cao, X. Dong, and X. Lin, "Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions, " IEEE Wireless Commun., vol. 22, no. 2, pp. 136-144, Apr. 2015.
-
(2015)
IEEE Wireless Commun
, vol.22
, Issue.2
, pp. 136-144
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Lin, X.4
-
156
-
-
84865498118
-
Secure key distribution for the smart grid
-
Sep
-
J. Xia and Y. Wang, "Secure key distribution for the smart grid, " IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1437-1443, Sep. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.3
, pp. 1437-1443
-
-
Xia, J.1
Wang, Y.2
-
157
-
-
84981313477
-
EDAT: Efficient data aggregation without TTP for privacy-assured smart metering
-
Kuala Lumpur, Malaysia
-
J. Ni, K. Zhang, X. Lin, and X. S. Shen, "EDAT: Efficient data aggregation without TTP for privacy-assured smart metering, " in Proc. ICC, Kuala Lumpur, Malaysia, 2016, pp. 1-6.
-
(2016)
Proc. ICC
, pp. 1-6
-
-
Ni, J.1
Zhang, K.2
Lin, X.3
Shen, X.S.4
-
158
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Warsaw, Poland
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps, " in Proc. EUROCRYPT, Warsaw, Poland, 2003, pp. 416-432.
-
(2003)
Proc. EUROCRYPT
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
159
-
-
61849086789
-
A new certificateless aggregate signature scheme
-
L. Zhang and F. Zhang, "A new certificateless aggregate signature scheme, " Comput. Commun., vol. 32, no. 6, pp. 1079-1085, 2009.
-
(2009)
Comput. Commun
, vol.32
, Issue.6
, pp. 1079-1085
-
-
Zhang, L.1
Zhang, F.2
-
160
-
-
84876794518
-
Identity-based multi-signatures from RSA
-
San Francisco, CA, USA
-
M. Bellare and G. Neven, "Identity-based multi-signatures from RSA, " in Proc. CT RSA, San Francisco, CA, USA, 2006, pp. 145-162.
-
(2006)
Proc. CT RSA
, pp. 145-162
-
-
Bellare, M.1
Neven, G.2
-
161
-
-
33746066354
-
Sequential aggregate signatures and multisignatures without random Oracles
-
St. Petersburg, Russia
-
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters, "Sequential aggregate signatures and multisignatures without random Oracles, " in Proc. EUROCRYPT, St. Petersburg, Russia, 2006, pp. 465-485.
-
(2006)
Proc. EUROCRYPT
, pp. 465-485
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
162
-
-
84994828087
-
Key-homomorphic signatures and applications to multiparty signatures
-
D. Derler and D. Slamanig, "Key-homomorphic signatures and applications to multiparty signatures, " Cryptol. ePrint Arch., Tech. Rep. 792, 2016. [Online]. Available: https://eprint.iacr.org/2016/792.pdf
-
(2016)
Cryptol. EPrint Arch., Tech. Rep
, vol.792
-
-
Derler, D.1
Slamanig, D.2
-
163
-
-
85015396702
-
Secure and deduplicated spatial crowdsourcing: A fog-based approach
-
Washington, DC, USA
-
J. Ni, X. Lin, K. Zhang, and Y. Yu, "Secure and deduplicated spatial crowdsourcing: A fog-based approach, " in Proc. Globecom, Washington, DC, USA, 2016, pp. 1-6.
-
(2016)
Proc. Globecom
, pp. 1-6
-
-
Ni, J.1
Lin, X.2
Zhang, K.3
Yu, Y.4
-
164
-
-
78649998784
-
Synchronized aggregate signatures: New definitions, constructions and applications
-
Chicago, IL, USA
-
J. H. Ahn, M. Green, and S. Hohenberger, "Synchronized aggregate signatures: New definitions, constructions and applications, " in Proc. ACM CCS, Chicago, IL, USA, 2010, pp. 473-484.
-
(2010)
Proc. ACM CCS
, pp. 473-484
-
-
Ahn, J.H.1
Green, M.2
Hohenberger, S.3
-
165
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, CA, USA
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data, " in Proc. IEEE S P, Berkeley, CA, USA, 2000, pp. 44-55.
-
(2000)
Proc. IEEE S P
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
166
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego, CA, USA
-
J. Li et al., "Fuzzy keyword search over encrypted data in cloud computing, " in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 441-445.
-
(2010)
Proc. IEEE INFOCOM
, pp. 441-445
-
-
Li, J.1
-
167
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Genoa, Italy
-
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. ICDCS, Genoa, Italy, 2010, pp. 253-262.
-
(2010)
Proc. ICDCS
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
168
-
-
84957071710
-
ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes
-
Denver, CO, USA
-
P. Rizomiliotis and S. Gritzalis, "ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes, " in Proc. CCSW, Denver, CO, USA, 2015, pp. 65-76.
-
(2015)
Proc. CCSW
, pp. 65-76
-
-
Rizomiliotis, P.1
Gritzalis, S.2
-
169
-
-
84914140074
-
Dynamic searchable encryption via blind storage
-
Berkeley, CA, USA
-
M. Naveed, M. Prabhakaran, and C. A. Gunter, "Dynamic searchable encryption via blind storage, " in Proc. IEEE S P, Berkeley, CA, USA, 2014, pp. 639-654.
-
(2014)
Proc. IEEE S P
, pp. 639-654
-
-
Naveed, M.1
Prabhakaran, M.2
Gunter, C.A.3
-
170
-
-
85023750059
-
A fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based service
-
X. Yang, F. Yin, and X. Tang, "A fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based service, " Sensors, vol. 17, no. 7, p. 1611, 2017.
-
(2017)
Sensors
, vol.17
, Issue.7
, pp. 1611
-
-
Yang, X.1
Yin, F.2
Tang, X.3
-
171
-
-
35048901123
-
Public key encryption with keyword search
-
Interlaken, Switzerland
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search, " in Proc. EUROCRYPT, Interlaken, Switzerland, 2004, pp. 506-522.
-
(2004)
Proc. EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
172
-
-
71549160150
-
Improved searchable public key encryption with designated tester
-
Sydney, NSW, Australia
-
H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee, "Improved searchable public key encryption with designated tester, " in Proc. ASIACCS, Sydney, NSW, Australia, 2009, pp. 376-379.
-
(2009)
Proc. ASIACCS
, pp. 376-379
-
-
Rhee, H.S.1
Park, J.H.2
Susilo, W.3
Lee, D.H.4
-
173
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Tokyo, Japan
-
Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system, " in Proc. Pairing, Tokyo, Japan, 2007, pp. 2-22.
-
(2007)
Proc. Pairing
, pp. 2-22
-
-
Hwang, Y.H.1
Lee, P.J.2
-
174
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Istanbul, Turkey
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products, " in Proc. EUROCRYPT, Istanbul, Turkey, 2008, pp. 146-162.
-
(2008)
Proc. EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
175
-
-
52149090559
-
Hidden-vector encryption with groups of prime order
-
Beijing, China
-
V. Iovino and G. Persiano, "Hidden-vector encryption with groups of prime order, " in Proc. Pairing, Beijing, China, 2008, pp. 75-88.
-
(2008)
Proc. Pairing
, pp. 75-88
-
-
Iovino, V.1
Persiano, G.2
-
176
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
San Diego, CA, USA
-
M. S. Islam, M. Kuzu, and M. Kantarcioglu, "Access pattern disclosure on searchable encryption: Ramification, attack and mitigation, " in Proc. NDSS, San Diego, CA, USA, 2012, pp. 1-15.
-
(2012)
Proc. NDSS
, pp. 1-15
-
-
Islam, M.S.1
Kuzu, M.2
Kantarcioglu, M.3
-
177
-
-
84910594273
-
Searchable encryption with secure and efficient updates
-
Scottsdale, AZ, USA
-
F. Hahn and F. Kerschbaum, "Searchable encryption with secure and efficient updates, " in Proc. ACM CCS, Scottsdale, AZ, USA, 2014, pp. 310-320.
-
(2014)
Proc. ACM CCS
, pp. 310-320
-
-
Hahn, F.1
Kerschbaum, F.2
-
178
-
-
85094635733
-
An architecture for a secure service discovery service
-
Seattle, WA, USA
-
S. E. Czerwinski, B. Y. Zhao, T. D. Hodes, A. D. Joseph, and R. H. Katz, "An architecture for a secure service discovery service, " in Proc. MobiCom, Seattle, WA, USA, 1999, pp. 24-35.
-
(1999)
Proc. MobiCom
, pp. 24-35
-
-
Czerwinski, S.E.1
Zhao, B.Y.2
Hodes, T.D.3
Joseph, A.D.4
Katz, R.H.5
-
179
-
-
84990841451
-
Privacy, discovery, and authentication for the Internet of Things
-
Oslo, Norway
-
D. J. Wu, A. Taly, A. Shankar, and D. Boneh, "Privacy, discovery, and authentication for the Internet of Things, " in Proc. ESORICS, Oslo, Norway, 2016, pp. 301-319.
-
(2016)
Proc. ESORICS
, pp. 301-319
-
-
Wu, D.J.1
Taly, A.2
Shankar, A.3
Boneh, D.4
-
180
-
-
50549101800
-
Public key broadcast encryption schemes with shorter transmissions
-
Sep
-
J. H. Park, H. J. Kim, M. H. Sung, and D. H. Lee, "Public key broadcast encryption schemes with shorter transmissions, " IEEE Trans. Broadcast., vol. 54, no. 3, pp. 401-411, Sep. 2008.
-
(2008)
IEEE Trans. Broadcast
, vol.54
, Issue.3
, pp. 401-411
-
-
Park, J.H.1
Kim, H.J.2
Sung, M.H.3
Lee, D.H.4
-
181
-
-
0034238689
-
Key management for restricted multicast using broadcast encryption
-
Aug
-
M. Abdalla, Y. Shavitt, and A. Wool, "Key management for restricted multicast using broadcast encryption, " IEEE/ACM Trans. Netw., vol. 8, no. 4, pp. 443-454, Aug. 2000.
-
(2000)
IEEE/ACM Trans. Netw
, vol.8
, Issue.4
, pp. 443-454
-
-
Abdalla, M.1
Shavitt, Y.2
Wool, A.3
-
182
-
-
33646870054
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Santa Barbara, CA, USA
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys, " in Proc. CRYPTO, Santa Barbara, CA, USA, 2005, pp. 258-275.
-
(2005)
Proc. CRYPTO
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
183
-
-
84861702751
-
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
-
Darmstadt, Germany
-
B. Libert, K. G. Paterson, and E. A. Quaglia, "Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model, " in Proc. PKC, Darmstadt, Germany, 2012, pp. 206-224.
-
(2012)
Proc. PKC
, pp. 206-224
-
-
Libert, B.1
Paterson, K.G.2
Quaglia, E.A.3
-
184
-
-
67349253018
-
SAGE: A strong privacy-preserving scheme against global eavesdropping for eHealth systems
-
May
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A strong privacy-preserving scheme against global eavesdropping for eHealth systems, " IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365-378, May 2009.
-
(2009)
IEEE J. Sel. Areas Commun
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
185
-
-
77953313061
-
SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks
-
San Diego, CA, USA
-
R. Lu, X. Lin, and X. Shen, "SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks, " in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
186
-
-
79960870810
-
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
-
Shanghai, China
-
X. Lin, R. Lu, X. Liang, and X. Shen, "STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs, " in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 2147-2155.
-
(2011)
Proc. IEEE INFOCOM
, pp. 2147-2155
-
-
Lin, X.1
Lu, R.2
Liang, X.3
Shen, X.4
-
187
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Santa Barbara, CA, USA
-
R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Proc. CRYPTO, Santa Barbara, CA, USA, 2010, pp. 465-482.
-
(2010)
Proc. CRYPTO
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
188
-
-
0020312165
-
Protocols for secure computations
-
Chicago, IL, USA
-
A. C. Yao, "Protocols for secure computations, " in Proc. SFCS, Chicago, IL, USA, 1982, pp. 160-164.
-
(1982)
Proc. SFCS
, pp. 160-164
-
-
Yao, A.C.1
-
189
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
Santa Barbara, CA, USA
-
K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption, " in Proc. CRYPTO, Santa Barbara, CA, USA, 2010, pp. 483-501.
-
(2010)
Proc. CRYPTO
, pp. 483-501
-
-
Chung, K.-M.1
Kalai, Y.2
Vadhan, S.3
-
190
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
Taormina, Italy
-
B. Parno, M. Raykova, and V. Vaikuntanathan, "How to delegate and verify in public: Verifiable computation from attribute-based encryption, " in Proc. TCC, Taormina, Italy, 2012, pp. 422-439.
-
(2012)
Proc. TCC
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
191
-
-
84873975919
-
Signatures of correct computation
-
Tokyo, Japan
-
C. Papamanthou, E. Shi, and R. Tamassia, "Signatures of correct computation, " in Proc. TCC, Tokyo, Japan, 2013, pp. 222-242.
-
(2013)
Proc. TCC
, pp. 222-242
-
-
Papamanthou, C.1
Shi, E.2
Tamassia, R.3
-
192
-
-
84873978628
-
Multi-client noninteractive verifiable computation
-
Tokyo, Japan
-
S. G. Choi, J. Katz, R. Kumaresan, and C. Cid, "Multi-client noninteractive verifiable computation, " in Proc. TCC, Tokyo, Japan, 2013, pp. 499-518.
-
(2013)
Proc. TCC
, pp. 499-518
-
-
Choi, S.G.1
Katz, J.2
Kumaresan, R.3
Cid, C.4
-
193
-
-
84924359626
-
Multiclient verifiable computation with stronger security guarantees
-
Warsaw, Poland
-
S. D. Gordon, J. Katz, F.-H. Liu, E. Shi, and H.-S. Zhou, "Multiclient verifiable computation with stronger security guarantees, " in Proc. TCC, Warsaw, Poland, 2015, pp. 144-168.
-
(2015)
Proc. TCC
, pp. 144-168
-
-
Gordon, S.D.1
Katz, J.2
Liu, F.-H.3
Shi, E.4
Zhou, H.-S.5
-
194
-
-
84979681531
-
Efficient techniques for publicly verifiable delegation of computation
-
Xi'an, China
-
K. Elkhiyaoui, M. Önen, M. Azraoui, and R. Molva, "Efficient techniques for publicly verifiable delegation of computation, " in Proc. ACM CCS, Xi'an, China, 2016, pp. 119-128.
-
(2016)
Proc. ACM CCS
, pp. 119-128
-
-
Elkhiyaoui, K.1
Önen, M.2
Azraoui, M.3
Molva, R.4
-
195
-
-
0343951569
-
Speeding up secret computations with insecure auxiliary devices
-
Santa Barbara, CA, USA
-
T. Matsumoto, K. Kato, and H. Iami, "Speeding up secret computations with insecure auxiliary devices, " in Proc. Crypto, Santa Barbara, CA, USA, 1988, pp. 497-506.
-
(1988)
Proc. Crypto
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Iami, H.3
-
196
-
-
0027617773
-
Fast server-aided secret computation protocols for modular exponentiation
-
Jun
-
S. Kawamura and A. Shimbo, "Fast server-aided secret computation protocols for modular exponentiation, " IEEE J. Sel. Areas Commun., vol. 11, no. 5, pp. 778-784, Jun. 1993.
-
(1993)
IEEE J. Sel. Areas Commun
, vol.11
, Issue.5
, pp. 778-784
-
-
Kawamura, S.1
Shimbo, A.2
-
197
-
-
84951041666
-
Efficient and secure delegation of group exponentiation to a single server
-
New York, NY, USA
-
B. Cavallo, G. D. Crescenzo, D. Kahrobaei, and V. Shpilrain, "Efficient and secure delegation of group exponentiation to a single server, " in Proc. RFIDSec, New York, NY, USA, 2015, pp. 156-173.
-
(2015)
Proc. RFIDSec
, pp. 156-173
-
-
Cavallo, B.1
Crescenzo, G.D.2
Kahrobaei, D.3
Shpilrain, V.4
-
198
-
-
33646773954
-
Server-aided verification: Theory and practice
-
Chennai, India
-
M. Girault and D. Lefranc, "Server-aided verification: Theory and practice, " in Proc. ASIACRYPT, Chennai, India, 2005, pp. 605-623.
-
(2005)
Proc. ASIACRYPT
, pp. 605-623
-
-
Girault, M.1
Lefranc, D.2
-
199
-
-
57049172488
-
Server-aided verification signatures: Definitions and new constructions
-
Nanjing, China
-
W. Wu, Y. Mu, W. Susilo, and X. Huang, "Server-aided verification signatures: Definitions and new constructions, " in Proc. ProvSec, Nanjing, China, 2008, pp. 141-155.
-
(2008)
Proc. ProvSec
, pp. 141-155
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
Huang, X.4
-
200
-
-
23044435711
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing, " J. Cryptol., vol. 17, no. 4, pp. 297-319, 2004.
-
(2004)
J. Cryptol
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
201
-
-
85052022812
-
DupLESS: Serveraided encryption for deduplicated storage
-
Washington, DC, USA
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "DupLESS: Serveraided encryption for deduplicated storage, " in Proc. Usenix Security, Washington, DC, USA, 2014, pp. 179-194.
-
(2014)
Proc. Usenix Security
, pp. 179-194
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
202
-
-
84869441394
-
Salus: A system for server-aided secure function evaluation
-
Raleigh, NC, USA
-
S. Kamara, P. Mohassel, and B. Riva, "Salus: A system for server-aided secure function evaluation, " in Proc. ACM CCS, Raleigh, NC, USA, 2012, pp. 797-808.
-
(2012)
Proc. ACM CCS
, pp. 797-808
-
-
Kamara, S.1
Mohassel, P.2
Riva, B.3
-
203
-
-
33746614258
-
Password based server aided key exchange
-
Singapore
-
Y. Cliff, Y. S. T. Tin, and C. Boyd, "Password based server aided key exchange, " in Proc. ACNS, Singapore, 2006, pp. 146-161.
-
(2006)
Proc. ACNS
, pp. 146-161
-
-
Cliff, Y.1
Tin, Y.S.T.2
Boyd, C.3
-
204
-
-
85028358232
-
Trajectory privacy preservation based on a fog structure for cloud location services
-
T. Wang et al., "Trajectory privacy preservation based on a fog structure for cloud location services, " IEEE Access, vol. 5, pp. 7692-7701, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 7692-7701
-
-
Wang, T.1
-
205
-
-
84979812487
-
Big privacy: Challenges and opportunities of privacy study in the age of big data
-
S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data, " IEEE Access, vol. 4, pp. 2751-2763, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 2751-2763
-
-
Yu, S.1
-
206
-
-
33746335051
-
Differential privacy
-
Venice, Italy
-
C. Dwork, "Differential privacy, " in Proc. ICALP, Venice, Italy, 2006, pp. 1-12.
-
(2006)
Proc. ICALP
, pp. 1-12
-
-
Dwork, C.1
-
207
-
-
84971637093
-
Privacy-preservingoutsourced association rule mining on vertically partitioned databases
-
Aug
-
L. Li, R. Lu, K.-K. R. Choo, A. Datta, and J. Shao, "Privacy-preservingoutsourced association rule mining on vertically partitioned databases, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 8, pp. 1847-1861, Aug. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.8
, pp. 1847-1861
-
-
Li, L.1
Lu, R.2
Choo, K.-K.R.3
Datta, A.4
Shao, J.5
-
208
-
-
85042774844
-
Exploiting social network to enhance human-to-human infection analysis without privacy leakage
-
to be published
-
K. Zhang, X. Liang, J. Ni, K. Yang, and X. Shen, "Exploiting social network to enhance human-to-human infection analysis without privacy leakage, " IEEE Trans. Depend. Secure Comput., to be published.
-
IEEE Trans. Depend. Secure Comput
-
-
Zhang, K.1
Liang, X.2
Ni, J.3
Yang, K.4
Shen, X.5
-
209
-
-
85016064811
-
Hybrid privacy-preserving clinical decision support system in fog - Cloud computing
-
Jan
-
X. Liu, R. H. Deng, Y. Yang, H. N. Tran, and S. Zhong, "Hybrid privacy-preserving clinical decision support system in fog - Cloud computing, " Future Gener. Comput. Syst., vol. 78, pp. 825-837, Jan. 2018.
-
(2018)
Future Gener. Comput. Syst
, vol.78
, pp. 825-837
-
-
Liu, X.1
Deng, R.H.2
Yang, Y.3
Tran, H.N.4
Zhong, S.5
-
210
-
-
84995527907
-
Deep learning with differential privacy
-
Vienna, Austria
-
M. Abadi et al., "Deep learning with differential privacy, " in Proc. ACM CCS, Vienna, Austria, 2016, pp. 308-318.
-
(2016)
Proc. ACM CCS
, pp. 308-318
-
-
Abadi, M.1
-
211
-
-
85020567479
-
Dynamic differential privacy for ADMM-based distributed classification learning
-
Jan
-
T. Zhang and Q. Zhu, "Dynamic differential privacy for ADMM-based distributed classification learning, " IEEE Trans. Inf. Forensics Security, vol. 12, no. 1, pp. 172-187, Jan. 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.1
, pp. 172-187
-
-
Zhang, T.1
Zhu, Q.2
-
212
-
-
84910685712
-
RAPPOR: Randomized aggregatable privacy-preserving ordinal response
-
Scottsdale, AZ, USA
-
Ú. Erlingsson, V. Pihur, and A. Korolova, "RAPPOR: Randomized aggregatable privacy-preserving ordinal response, " in Proc. ACM CCS, Scottsdale, AZ, USA, 2014, pp. 1054-1067.
-
(2014)
Proc. ACM CCS
, pp. 1054-1067
-
-
Erlingsson, U.1
Pihur, V.2
Korolova, A.3
-
213
-
-
84995468307
-
Heavy hitter estimation over set-valued data with local differential privacy
-
Vienna, Austria
-
Z. Qin et al., "Heavy hitter estimation over set-valued data with local differential privacy, " in Proc. ACM CCS, Vienna, Austria, 2016, pp. 192-203.
-
(2016)
Proc. ACM CCS
, pp. 192-203
-
-
Qin, Z.1
-
214
-
-
84928596525
-
An overview of fog computing and its security issues
-
I. Stojmenovic, S. Wen, X. Huang, and H. Luan, "An overview of fog computing and its security issues, " Concurrency Comput. Pract. Exp., vol. 28, no. 10, pp. 2991-3005, 2016.
-
(2016)
Concurrency Comput. Pract. Exp
, vol.28
, Issue.10
, pp. 2991-3005
-
-
Stojmenovic, I.1
Wen, S.2
Huang, X.3
Luan, H.4
-
215
-
-
77953213147
-
Myths and fallacies of 'personally identifiable information'
-
A. Narayanan and V. Shmatikov, "Myths and fallacies of 'personally identifiable information, "' Commun. ACM, vol. 53, no. 6, pp. 24-26, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.6
, pp. 24-26
-
-
Narayanan, A.1
Shmatikov, V.2
-
216
-
-
84945176880
-
SoK: Research perspectives and challenges for bitcoin and cryptocurrencies
-
San Jose, CA, USA
-
J. Bonneau et al., "SoK: Research perspectives and challenges for bitcoin and cryptocurrencies, " in Proc. IEEE S P, San Jose, CA, USA, 2015, pp. 104-121.
-
(2015)
Proc. IEEE S P
, pp. 104-121
-
-
Bonneau, J.1
-
217
-
-
84875784661
-
A comparative survey on symmetric key encryption techniques
-
M. Agrawal and P. Mishra, "A comparative survey on symmetric key encryption techniques, " Int. J. Comput. Sci. Eng., vol. 4, no. 5, pp. 877-882, 2012.
-
(2012)
Int. J. Comput. Sci. Eng
, vol.4
, Issue.5
, pp. 877-882
-
-
Agrawal, M.1
Mishra, P.2
-
218
-
-
0009010310
-
A survey of encryption standards
-
Dec
-
B. Kaliski, "A survey of encryption standards, " IEEE Micro, vol. 13, no. 6, pp. 74-81, Dec. 1993.
-
(1993)
IEEE Micro
, vol.13
, Issue.6
, pp. 74-81
-
-
Kaliski, B.1
|