메뉴 건너뛰기




Volumn 20, Issue 1, 2018, Pages 601-628

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions

Author keywords

edge computing; Fog computing; Internet of Things; security and privacy

Indexed keywords

AUGMENTED REALITY; CLOUD COMPUTING; COMPUTER ARCHITECTURE; COMPUTER PRIVACY; DATA PRIVACY; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; ENVIRONMENTAL MANAGEMENT; FOG; GEOGRAPHICAL DISTRIBUTION; INFORMATION SERVICES; INTERACTIVE COMPUTER SYSTEMS; NETWORK ARCHITECTURE; REAL TIME SYSTEMS;

EID: 85042096235     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2017.2762345     Document Type: Article
Times cited : (542)

References (218)
  • 1
    • 84941085241 scopus 로고    scopus 로고
    • Internet of Things: A survey on enabling technologies, protocols, and applications
    • 4th Quart
    • A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications, " IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts , vol.17 , Issue.4 , pp. 2347-2376
    • Al-Fuqaha, A.1    Guizani, M.2    Mohammadi, M.3    Aledhari, M.4    Ayyash, M.5
  • 2
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbia, R. Buyyab, S. Marusica, and M. Palaniswamia, "Internet of Things (IoT): A vision, architectural elements, and future directions, " Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
    • (2013) Future Gener. Comput. Syst , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbia, J.1    Buyyab, R.2    Marusica, S.3    Palaniswamia, M.4
  • 7
    • 84987842183 scopus 로고    scopus 로고
    • Edge computing: Vision and challenges
    • Oct
    • W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges, " IEEE Internet Things J., vol. 3, no. 5, pp. 637-646, Oct. 2016.
    • (2016) IEEE Internet Things J , vol.3 , Issue.5 , pp. 637-646
    • Shi, W.1    Cao, J.2    Zhang, Q.3    Li, Y.4    Xu, L.5
  • 9
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • L. M. Vaquero and L. Rodero-Merino, "Finding your way in the fog: Towards a comprehensive definition of fog computing, " ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 27-32, 2014.
    • (2014) ACM SIGCOMM Comput. Commun. Rev , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 11
    • 85015792124 scopus 로고    scopus 로고
    • Wikipedia. (2016). Fog Computing. [Online]. Available: https://en.wikipedia.org/wiki/Fog-computing
    • (2016) Fog Computing
  • 12
    • 85008245198 scopus 로고    scopus 로고
    • Mobile edge computing fog et al.: A survey and analysis of security threats and challenges
    • Jan
    • R. Roman, J. Lopez, and M. Manbo, "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges, " Future Gener. Comput. Syst., vol. 78, pp. 680-698, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 680-698
    • Roman, R.1    Lopez, J.2    Manbo, M.3
  • 13
    • 84938672829 scopus 로고    scopus 로고
    • Security for the Internet of Things: A survey of existing protocols and open research issues
    • 3rd Quart
    • J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things: A survey of existing protocols and open research issues, " IEEE Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294-1312, 3rd Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts , vol.17 , Issue.3 , pp. 1294-1312
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 14
    • 84940533844 scopus 로고    scopus 로고
    • Exploiting mobile social behaviors for Sybil detection
    • Hong Kong
    • K. Zhang, X. Liang, R. Lu, K. Yang, and X. S. Shen, "Exploiting mobile social behaviors for Sybil detection, " in Proc. INFOCOM, Hong Kong, 2015, pp. 271-279.
    • (2015) Proc. INFOCOM , pp. 271-279
    • Zhang, K.1    Liang, X.2    Lu, R.3    Yang, K.4    Shen, X.S.5
  • 15
    • 85015190263 scopus 로고    scopus 로고
    • Fog computing for the Internet of Things: Security and privacy issues
    • Mar./Apr
    • A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the Internet of Things: Security and privacy issues, " IEEE Internet Comput., vol. 21, no. 2, pp. 34-42, Mar./Apr. 2017.
    • (2017) IEEE Internet Comput , vol.21 , Issue.2 , pp. 34-42
    • Alrawais, A.1    Alhothaily, A.2    Hu, C.3    Cheng, X.4
  • 16
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • Hangzhou, China
    • S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues, " in Proc. Mobidata, Hangzhou, China, 2015, pp. 37-42.
    • (2015) Proc. Mobidata , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.3
  • 17
    • 84961589936 scopus 로고    scopus 로고
    • Theoretical modelling of fog computing: A green computing paradigm to support IoT applications
    • Mar
    • S. Sarkar and S. Misra, "Theoretical modelling of fog computing: A green computing paradigm to support IoT applications, " IET Netw., vol. 5, no. 2, pp. 23-29, Mar. 2016.
    • (2016) IET Netw , vol.5 , Issue.2 , pp. 23-29
    • Sarkar, S.1    Misra, S.2
  • 19
    • 84966662927 scopus 로고    scopus 로고
    • Assessment of the suitability of fog computing in the context of Internet of Things
    • to be published
    • S. Sarkar, S. Chatterjee, and S. Misra, "Assessment of the suitability of fog computing in the context of Internet of Things, " IEEE Trans. Cloud Comput., to be published.
    • IEEE Trans. Cloud Comput
    • Sarkar, S.1    Chatterjee, S.2    Misra, S.3
  • 20
    • 85018784068 scopus 로고    scopus 로고
    • RAINA: Reliability and adaptability in android for fog computing
    • Apr
    • K. Dantu, S. Y. Ko, and L. Ziarek, "RAINA: Reliability and adaptability in android for fog computing, " IEEE Commun. Mag., vol. 55, no. 4, pp. 41-45, Apr. 2017.
    • (2017) IEEE Commun. Mag , vol.55 , Issue.4 , pp. 41-45
    • Dantu, K.1    Ko, S.Y.2    Ziarek, L.3
  • 23
    • 85016275071 scopus 로고    scopus 로고
    • Foud: Integrating fog and cloud for 5G-enabled V2G networks
    • Mar./Apr
    • M. Tao, K. Ota, and M. Dong, "Foud: Integrating fog and cloud for 5G-enabled V2G networks, " IEEE Netw., vol. 31, no. 2, pp. 8-13, Mar./Apr. 2017.
    • (2017) IEEE Netw , vol.31 , Issue.2 , pp. 8-13
    • Tao, M.1    Ota, K.2    Dong, M.3
  • 24
    • 85028375282 scopus 로고    scopus 로고
    • EXEGESIS: Extreme edge resource harvesting for a virtualized fog environment
    • Jul
    • E. K. Markakis et al., "EXEGESIS: Extreme edge resource harvesting for a virtualized fog environment, " IEEE Commun. Mag., vol. 55, no. 7, pp. 173-179, Jul. 2017.
    • (2017) IEEE Commun. Mag , vol.55 , Issue.7 , pp. 173-179
    • Markakis, E.K.1
  • 26
    • 85012875280 scopus 로고    scopus 로고
    • Exploiting smart E-health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
    • Jan
    • A. M. Rahmani et al., "Exploiting smart E-health gateways at the edge of healthcare Internet-of-Things: A fog computing approach, " Future Gener. Comput. Syst., vol. 78, pp. 641-658, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 641-658
    • Rahmani, A.M.1
  • 27
    • 85028008668 scopus 로고    scopus 로고
    • Fog computing in healthcare - A review and discussion
    • F. A. Kraemer, A. E. Braten, N. Tamkittikhun, and D. Palma, "Fog computing in healthcare - A review and discussion, " IEEE Access, vol. 5, pp. 9206-9222, 2017.
    • (2017) IEEE Access , vol.5 , pp. 9206-9222
    • Kraemer, F.A.1    Braten, A.E.2    Tamkittikhun, N.3    Palma, D.4
  • 28
    • 85024260157 scopus 로고    scopus 로고
    • Cloud Computing
    • B. Hayes, "Cloud Computing, " Commun. ACM, vol. 51, no. 7, pp. 9-11, 2008.
    • (2008) Commun. ACM , vol.51 , Issue.7 , pp. 9-11
    • Hayes, B.1
  • 29
    • 85019014090 scopus 로고    scopus 로고
    • Multiobjective optimization in cloud brokering systems for connected Internet of Things
    • Apr
    • T. Kumrai, K. Ota, M. Dong, J. Kishigami, and D. K. Sung, "Multiobjective optimization in cloud brokering systems for connected Internet of Things, " IEEE Internet Things J., vol. 4, no. 2, pp. 404-413, Apr. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.2 , pp. 404-413
    • Kumrai, T.1    Ota, K.2    Dong, M.3    Kishigami, J.4    Sung, D.K.5
  • 30
    • 84999748172 scopus 로고    scopus 로고
    • Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey
    • 4th Quart
    • N. C. Luong et al., "Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey, " IEEE Commun. Surveys Tuts., vol. 18, no. 4, pp. 2546-2590, 4th Quart., 2016.
    • (2016) IEEE Commun. Surveys Tuts , vol.18 , Issue.4 , pp. 2546-2590
    • Luong, N.C.1
  • 31
    • 84958935292 scopus 로고    scopus 로고
    • Integration of cloud computing and Internet of Things: A survey
    • Mar
    • A. Botta, W. Donato, V. Persico, and A. Pescapé, "Integration of cloud computing and Internet of Things: A survey, " Future Gener. Comput. Syst., vol. 56, pp. 684-700, Mar. 2016.
    • (2016) Future Gener. Comput. Syst , vol.56 , pp. 684-700
    • Botta, A.1    Donato, W.2    Persico, V.3    Pescapé, A.4
  • 32
    • 84964790214 scopus 로고    scopus 로고
    • Radio access network virtualization for the social Internet of Things
    • Nov./Dec
    • H. Li, M. Dong, and K. Ota, "Radio access network virtualization for the social Internet of Things, " IEEE Cloud Comput., vol. 2, no. 6, pp. 42-50, Nov./Dec. 2015.
    • (2015) IEEE Cloud Comput , vol.2 , Issue.6 , pp. 42-50
    • Li, H.1    Dong, M.2    Ota, K.3
  • 33
    • 84866627419 scopus 로고    scopus 로고
    • Fog computing and its role in the Internet of Things
    • Helsinki, Finland
    • F. Bonomi, R. Milito, J. Zhu, and S. Addepali, "Fog computing and its role in the Internet of Things, " in Proc. MCC Workshop, Helsinki, Finland, 2012, pp. 13-16.
    • (2012) Proc. MCC Workshop , pp. 13-16
    • Bonomi, F.1    Milito, R.2    Zhu, J.3    Addepali, S.4
  • 34
    • 84962284412 scopus 로고    scopus 로고
    • Developing IoT applications in the fog: A distributed dataflow approach
    • Seoul, South Korea
    • N. K. Giang, M. Blackstock, R. Lea, and V. C. M. Leung, "Developing IoT applications in the fog: A distributed dataflow approach, " in Proc. IOT, Seoul, South Korea, 2015, pp. 155-162.
    • (2015) Proc. IOT , pp. 155-162
    • Giang, N.K.1    Blackstock, M.2    Lea, R.3    Leung, V.C.M.4
  • 35
    • 85012170641 scopus 로고    scopus 로고
    • Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems
    • Oct
    • X. Masip-Bruin, E. Marín-Tordera, G. Tashakor, A. Jukan, and G.-J. Ren, "Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems, " IEEE Wireless Commun., vol. 23, no. 5, pp. 120-128, Oct. 2016.
    • (2016) IEEE Wireless Commun , vol.23 , Issue.5 , pp. 120-128
    • Masip-Bruin, X.1    Marín-Tordera, E.2    Tashakor, G.3    Jukan, A.4    Ren, G.-J.5
  • 37
    • 85010756872 scopus 로고    scopus 로고
    • An integrated architecture for software defined and virtualized radio access networks with fog computing
    • Jan./Feb
    • K. Liang, L. Zhao, X. Chu, and H.-H. Chen, "An integrated architecture for software defined and virtualized radio access networks with fog computing, " IEEE Netw., vol. 31, no. 1, pp. 80-87, Jan./Feb. 2017.
    • (2017) IEEE Netw , vol.31 , Issue.1 , pp. 80-87
    • Liang, K.1    Zhao, L.2    Chu, X.3    Chen, H.-H.4
  • 39
    • 85031320785 scopus 로고    scopus 로고
    • Catalyzing cloudfog interoperation in 5G wireless networks: An SDN approach
    • Sep
    • P. Yang, N. Zhang, Y. Bi, L. Yu, and X. S. Shen, "Catalyzing cloudfog interoperation in 5G wireless networks: An SDN approach, " IEEE Netw., vol. 31, no. 5, pp. 14-20, Sep. 2017.
    • (2017) IEEE Netw , vol.31 , Issue.5 , pp. 14-20
    • Yang, P.1    Zhang, N.2    Bi, Y.3    Yu, L.4    Shen, X.S.5
  • 40
    • 84950986038 scopus 로고    scopus 로고
    • Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing
    • Hangzhou, China
    • Y. Cao, P. Hou, D. Brown, J. Wang, and S. Chen, "Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing, " in Proc. Mobidata, Hangzhou, China, 2015, pp. 43-48.
    • (2015) Proc. Mobidata , pp. 43-48
    • Cao, Y.1    Hou, P.2    Brown, D.3    Wang, J.4    Chen, S.5
  • 41
    • 84963780985 scopus 로고    scopus 로고
    • Energy management-as-aservice over fog computing platform
    • Apr
    • M. A. A. Faruque and K. Vatanparvar, "Energy management-as-aservice over fog computing platform, " IEEE Internet Things J., vol. 3, no. 2, pp. 161-169, Apr. 2016.
    • (2016) IEEE Internet Things J , vol.3 , Issue.2 , pp. 161-169
    • Faruque, M.A.A.1    Vatanparvar, K.2
  • 42
    • 84988849458 scopus 로고    scopus 로고
    • Priority control based on website categories in edge computing
    • San Francisco, CA, USA
    • N. Kamiyama et al., "Priority control based on website categories in edge computing, " in Proc. IEEE INFOCOM WKSHPS, San Francisco, CA, USA, 2016, pp. 776-781.
    • (2016) Proc. IEEE INFOCOM WKSHPS , pp. 776-781
    • Kamiyama, N.1
  • 43
    • 84969922595 scopus 로고    scopus 로고
    • The promise of edge computing
    • May
    • W. Shi and S. Dustdar, "The promise of edge computing, " Computers, vol. 49, no. 5, pp. 78-81, May 2016.
    • (2016) Computers , vol.49 , Issue.5 , pp. 78-81
    • Shi, W.1    Dustdar, S.2
  • 44
    • 85028360031 scopus 로고    scopus 로고
    • Mobile edge computing: A survey on architecture and computation offloading
    • 3rd Quart
    • P. Mach and Z. Becvar, "Mobile edge computing: A survey on architecture and computation offloading, " IEEE Commun. Surveys Tuts., vol. 19, no. 3, pp. 1628-1656, 3rd Quart., 2017.
    • (2017) IEEE Commun. Surveys Tuts , vol.19 , Issue.3 , pp. 1628-1656
    • Mach, P.1    Becvar, Z.2
  • 45
    • 85042709608 scopus 로고    scopus 로고
    • How can edge computing benefit from software-defined networking: A survey, use cases & future directions
    • to be published
    • A. C. Baktir, A. Ozgovde, and C. Ersoy, "How can edge computing benefit from software-defined networking: A survey, use cases & future directions, " IEEE Commun. Surveys Tuts., to be published.
    • IEEE Commun. Surveys Tuts
    • Baktir, A.C.1    Ozgovde, A.2    Ersoy, C.3
  • 46
    • 85018950987 scopus 로고    scopus 로고
    • Clarifying fog computing and networking: 10 questions and answers
    • Apr
    • M. Chiang, S. Ha, I. Chih-Lin, F. Risso, and T. Zhang, "Clarifying fog computing and networking: 10 questions and answers, " IEEE Commun. Mag., vol. 55, no. 4, pp. 18-20, Apr. 2017.
    • (2017) IEEE Commun. Mag , vol.55 , Issue.4 , pp. 18-20
    • Chiang, M.1    Ha, S.2    Chih-Lin, I.3    Risso, F.4    Zhang, T.5
  • 47
    • 85018975973 scopus 로고    scopus 로고
    • Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges
    • Apr
    • T. X. Tran, A. Hajisami, P. Pandey, and D. Pompili, "Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges, " IEEE Commun. Mag., vol. 55, no. 4, pp. 54-61, Apr. 2017.
    • (2017) IEEE Commun. Mag , vol.55 , Issue.4 , pp. 54-61
    • Tran, T.X.1    Hajisami, A.2    Pandey, P.3    Pompili, D.4
  • 48
    • 84921403194 scopus 로고    scopus 로고
    • Smart human security framework using Internet of Things, cloud and fog computing
    • New Delhi, India
    • V. K. Sehgal, A. Patrick, A. Soni, and L. Rajput, "Smart human security framework using Internet of Things, cloud and fog computing, " in Proc. Intell. Distrib. Comput., New Delhi, India, 2015, pp. 251-263.
    • (2015) Proc. Intell. Distrib. Comput , pp. 251-263
    • Sehgal, V.K.1    Patrick, A.2    Soni, A.3    Rajput, L.4
  • 49
    • 85014093576 scopus 로고    scopus 로고
    • A survey of standards for machine-to-machine and the Internet of Things
    • 1st Quart
    • V. Gazis, "A survey of standards for machine-to-machine and the Internet of Things, " IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 482-511, 1st Quart., 2017.
    • (2017) IEEE Commun. Surveys Tuts , vol.19 , Issue.1 , pp. 482-511
    • Gazis, V.1
  • 50
    • 85016940214 scopus 로고    scopus 로고
    • Privacy-preserving real-time navigation system using vehicular crowdsourcing
    • Montreal, QC, Canada
    • J. Ni, X. Lin, K. Zhang, and X. Shen, "Privacy-preserving real-time navigation system using vehicular crowdsourcing, " in Proc. IEEE VTC Fall, Montreal, QC, Canada, 2016, pp. 1-5.
    • (2016) Proc. IEEE VTC Fall , pp. 1-5
    • Ni, J.1    Lin, X.2    Zhang, K.3    Shen, X.4
  • 51
    • 84944316909 scopus 로고    scopus 로고
    • Crowd map: Accurate reconstruction of indoor floor plans from crowdsourced sensor-rich videos
    • Columbus, OH, USA
    • S. Chen, M. Li, K. Ren, and C. Qiao, "Crowd map: Accurate reconstruction of indoor floor plans from crowdsourced sensor-rich videos, " in Proc. ICDCS, Columbus, OH, USA, 2015, pp. 1-10.
    • (2015) Proc. ICDCS , pp. 1-10
    • Chen, S.1    Li, M.2    Ren, K.3    Qiao, C.4
  • 52
    • 85042717818 scopus 로고    scopus 로고
    • Extending the cloud with fog: Security challenges and opportunities
    • Savannah, GA, USA
    • J. Shropshire, "Extending the cloud with fog: Security challenges and opportunities, " in Proc. Inf. Syst., Savannah, GA, USA, 2014, pp. 1-10.
    • (2014) Proc. Inf. Syst , pp. 1-10
    • Shropshire, J.1
  • 53
    • 85007504286 scopus 로고    scopus 로고
    • Mobile edge computing: Opportunities, solutions, and challenges
    • May
    • E. Ahmed and M. H. Rehmani, "Mobile edge computing: Opportunities, solutions, and challenges, " Future Gener. Comput. Syst., vol. 70, pp. 59-63, May 2017.
    • (2017) Future Gener. Comput. Syst , vol.70 , pp. 59-63
    • Ahmed, E.1    Rehmani, M.H.2
  • 54
    • 84976371915 scopus 로고    scopus 로고
    • Fog computing may help to save energy in cloud computing
    • May
    • F. Jalali, K. Hinton, R. Ayre, T. Alpcan, and P. S. Tucker, "Fog computing may help to save energy in cloud computing, " IEEE J. Sel. Areas Commun., vol. 34, no. 5, pp. 1728-1739, May 2016.
    • (2016) IEEE J. Sel. Areas Commun , vol.34 , Issue.5 , pp. 1728-1739
    • Jalali, F.1    Hinton, K.2    Ayre, R.3    Alpcan, T.4    Tucker, P.S.5
  • 55
    • 84979609826 scopus 로고    scopus 로고
    • Fog-computing-based radio access networks: Issues and challenges
    • Jul./Aug
    • M. Peng, S. Yan, K. Zhang, and C. Wang, "Fog-computing-based radio access networks: Issues and challenges, " IEEE Netw., vol. 30, no. 4, pp. 46-53, Jul./Aug. 2016.
    • (2016) IEEE Netw , vol.30 , Issue.4 , pp. 46-53
    • Peng, M.1    Yan, S.2    Zhang, K.3    Wang, C.4
  • 58
    • 84986211321 scopus 로고    scopus 로고
    • Fog computing: Helping the Internet of Things realize its potential
    • Aug
    • A. V. Dastjerdi and R. Buyya, "Fog computing: Helping the Internet of Things realize its potential, " Computers, vol. 49, no. 8, pp. 112-116, Aug. 2016.
    • (2016) Computers , vol.49 , Issue.8 , pp. 112-116
    • Dastjerdi, A.V.1    Buyya, R.2
  • 59
    • 84962802418 scopus 로고    scopus 로고
    • Rise of the indoor crowd: Reconstruction of building interior view via mobile crowdsourcing
    • Seoul, South Korea
    • S. Chen, M. Li, K. Ren, X. Fu, and C. Qiao, "Rise of the indoor crowd: Reconstruction of building interior view via mobile crowdsourcing, " in Proc. ACM SenSys, Seoul, South Korea, 2015, pp. 59-71.
    • (2015) Proc. ACM SenSys , pp. 59-71
    • Chen, S.1    Li, M.2    Ren, K.3    Fu, X.4    Qiao, C.5
  • 61
    • 77954592983 scopus 로고    scopus 로고
    • An intelligent secure and privacypreserving parking scheme through vehicular communications
    • Jul
    • R. Lu, X. Lin, H. Zhu, and X. Shen, "An intelligent secure and privacypreserving parking scheme through vehicular communications, " IEEE Trans. Veh. Technol., vol. 59, no. 6, pp. 2772-2784, Jul. 2010.
    • (2010) IEEE Trans. Veh. Technol , vol.59 , Issue.6 , pp. 2772-2784
    • Lu, R.1    Lin, X.2    Zhu, H.3    Shen, X.4
  • 62
    • 85042711735 scopus 로고    scopus 로고
    • Cloud-based privacypreserving parking navigation through vehicular communications
    • Guangzhou, China
    • J. Ni, K. Zhang, X. Lin, Y. Yu, and X. Shen, "Cloud-based privacypreserving parking navigation through vehicular communications, " in Proc. SecureComm, Guangzhou, China, 2016, pp. 85-103.
    • (2016) Proc. SecureComm , pp. 85-103
    • Ni, J.1    Zhang, K.2    Lin, X.3    Yu, Y.4    Shen, X.5
  • 64
    • 85029592539 scopus 로고    scopus 로고
    • Computation offloading and resource allocation in wireless cellular networks with mobile edge computing
    • Aug
    • C. Wang, C. Liang, F. R. Yu, Q. Chen, and L. Tang, "Computation offloading and resource allocation in wireless cellular networks with mobile edge computing, " IEEE Trans. Wireless Commun., vol. 16, no. 8, pp. 4924-4938, Aug. 2017.
    • (2017) IEEE Trans. Wireless Commun , vol.16 , Issue.8 , pp. 4924-4938
    • Wang, C.1    Liang, C.2    Yu, F.R.3    Chen, Q.4    Tang, L.5
  • 65
    • 84992727011 scopus 로고    scopus 로고
    • Mobile-edge computing: Partial computation offloading using dynamic voltage scaling
    • Oct
    • Y. Wang, M. Sheng, X. Wang, L. Wang, and J. Li, "Mobile-edge computing: Partial computation offloading using dynamic voltage scaling, " IEEE Trans. Commun., vol. 64, no. 10, pp. 4268-4282, Oct. 2016.
    • (2016) IEEE Trans. Commun , vol.64 , Issue.10 , pp. 4268-4282
    • Wang, Y.1    Sheng, M.2    Wang, X.3    Wang, L.4    Li, J.5
  • 66
    • 84875259808 scopus 로고    scopus 로고
    • Server-aided signatures verification secure against collusion attack
    • S. S. M. Chow, M. H. Au, and W. Susilo, "Server-aided signatures verification secure against collusion attack, " Inf. Security Tech. Rep., vol. 17, no. 3, pp. 46-57, 2013.
    • (2013) Inf. Security Tech. Rep , vol.17 , Issue.3 , pp. 46-57
    • Chow, S.S.M.1    Au, M.H.2    Susilo, W.3
  • 67
    • 84861959172 scopus 로고    scopus 로고
    • Privacypreserving public auditing for secure cloud storage
    • Feb
    • C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacypreserving public auditing for secure cloud storage, " IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
    • (2013) IEEE Trans. Comput , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 68
    • 85009971482 scopus 로고    scopus 로고
    • Security and privacy in smart city applications: Challenges and solutions
    • Jan
    • K. Zhang et al., "Security and privacy in smart city applications: Challenges and solutions, " IEEE Commun. Mag., vol. 55, no. 1, pp. 122-129, Jan. 2017.
    • (2017) IEEE Commun. Mag , vol.55 , Issue.1 , pp. 122-129
    • Zhang, K.1
  • 69
    • 85042701451 scopus 로고    scopus 로고
    • Smart Home Devices Used As Weapons in Website Attack
    • London, U.K., Oct
    • Smart Home Devices Used As Weapons in Website Attack, BBC News, London, U.K., Oct. 2016. [Online]. Available: www.bbc.com/news/technology-37738823
    • (2016) BBC News
  • 71
    • 85042704142 scopus 로고    scopus 로고
    • A shared parking model in vehicular network using fog and cloud environment
    • Busan, South Korea
    • O. T. T. Kim, N. D. Tri, V. D. Nguyen, N. H. Tran, and C. S. Hong, "A shared parking model in vehicular network using fog and cloud environment, " in Proc. APNOMS, Busan, South Korea, 2015, pp. 1-6.
    • (2015) Proc. APNOMS , pp. 1-6
    • Kim, O.T.T.1    Tri, N.D.2    Nguyen, V.D.3    Tran, N.H.4    Hong, C.S.5
  • 72
    • 85021672640 scopus 로고    scopus 로고
    • A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing
    • Jun
    • S. Basudan, X. Lin, and K. Sankaranarayanan, "A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing, " IEEE Internet Things J., vol. 4, no. 3, pp. 772-782, Jun. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.3 , pp. 772-782
    • Basudan, S.1    Lin, X.2    Sankaranarayanan, K.3
  • 73
    • 85027883140 scopus 로고    scopus 로고
    • SCoP: Smartphone energy saving by merging push services in fog computing
    • S. Gao, Z. Peng, B. Xiao, Q. Xiao, and Y. Song, "SCoP: Smartphone energy saving by merging push services in fog computing, " in Proc. IWQoS, 2017, pp. 1-10.
    • (2017) Proc. IWQoS , pp. 1-10
    • Gao, S.1    Peng, Z.2    Xiao, B.3    Xiao, Q.4    Song, Y.5
  • 74
    • 85042714143 scopus 로고    scopus 로고
    • Fog computing in healthcare Internet of Things: A case study on ECG feature extraction
    • Liverpool, U.K.
    • T. N. Gia et al., "Fog computing in healthcare Internet of Things: A case study on ECG feature extraction, " in Proc. CIT/IUCC/DASC/PICOM, Liverpool, U.K., 2015, pp. 1-8.
    • (2015) Proc. CIT/IUCC/DASC/PICOM , pp. 1-8
    • Gia, T.N.1
  • 75
    • 85028437162 scopus 로고    scopus 로고
    • Security, privacy, and fairness in fog-based vehicular crowdsensing
    • Jun
    • J. Ni, A. Zhang, X. Lin, and X. S. Shen, "Security, privacy, and fairness in fog-based vehicular crowdsensing, " IEEE Commun. Mag., vol. 55, no. 6, pp. 146-152, Jun. 2017.
    • (2017) IEEE Commun. Mag , vol.55 , Issue.6 , pp. 146-152
    • Ni, J.1    Zhang, A.2    Lin, X.3    Shen, X.S.4
  • 76
    • 85042709029 scopus 로고    scopus 로고
    • E-HAMC: Leveraging fog computing for emergency alert service
    • St. Louis, MO, USA
    • M. Aazam and E.-N. Huh, "E-HAMC: Leveraging fog computing for emergency alert service, " in Proc. PerCom Workshops, St. Louis, MO, USA, 2015, pp. 1-6.
    • (2015) Proc. PerCom Workshops , pp. 1-6
    • Aazam, M.1    Huh, E.-N.2
  • 77
    • 85032360849 scopus 로고    scopus 로고
    • Fogempowered anomaly detection in IoT using hyperellipsoidal clustering
    • Oct
    • L. Lyu, J. Jin, S. Rajasegarar, X. He, and M. Palaniswami, "Fogempowered anomaly detection in IoT using hyperellipsoidal clustering, " IEEE Internet Things J., vol. 4, no. 5, pp. 1174-1184, Oct. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.5 , pp. 1174-1184
    • Lyu, L.1    Jin, J.2    Rajasegarar, S.3    He, X.4    Palaniswami, M.5
  • 78
    • 85037059583 scopus 로고    scopus 로고
    • LoDPD: A location differencebased proximity detection protocol for fog computing
    • Oct
    • Y. Huo, C. Hu, X. Qi, and T. Jing, "LoDPD: A location differencebased proximity detection protocol for fog computing, " IEEE Internet Things J., vol. 4, no. 5, pp. 1117-1124, Oct. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.5 , pp. 1117-1124
    • Huo, Y.1    Hu, C.2    Qi, X.3    Jing, T.4
  • 79
    • 85021436057 scopus 로고    scopus 로고
    • Position based cryptography with location privacy: A step for fog computing
    • Jan
    • R. Yang et al., "Position based cryptography with location privacy: A step for fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 799-806, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 799-806
    • Yang, R.1
  • 80
    • 85018184618 scopus 로고    scopus 로고
    • Exploring fog computing-based adaptive vehicular data scheduling policies through a compositional formal method - PEPA
    • Apr
    • X. Chen and L. Wang, "Exploring fog computing-based adaptive vehicular data scheduling policies through a compositional formal method - PEPA, " IEEE Commun. Lett., vol. 21, no. 4, pp. 745-748, Apr. 2017.
    • (2017) IEEE Commun. Lett , vol.21 , Issue.4 , pp. 745-748
    • Chen, X.1    Wang, L.2
  • 81
    • 84884572913 scopus 로고    scopus 로고
    • Securing m-healthcare social networks: Challenges, countermeasures and future directions
    • Aug
    • J. Zhou, Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos, "Securing m-healthcare social networks: Challenges, countermeasures and future directions, " IEEE Wireless Commun., vol. 20, no. 4, pp. 12-21, Aug. 2013.
    • (2013) IEEE Wireless Commun , vol.20 , Issue.4 , pp. 12-21
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Lin, X.4    Vasilakos, A.V.5
  • 82
    • 77649169684 scopus 로고    scopus 로고
    • Resource-aware secure ECG healthcare monitoring through body sensor networks
    • Feb
    • H. Wang et al., "Resource-aware secure ECG healthcare monitoring through body sensor networks, " IEEE Wireless Commun., vol. 17, no. 1, pp. 12-19, Feb. 2010.
    • (2010) IEEE Wireless Commun , vol.17 , Issue.1 , pp. 12-19
    • Wang, H.1
  • 83
    • 85029366507 scopus 로고    scopus 로고
    • Efficient and scalable query authentication for cloud-based storage systems with multiple data sources
    • Jul./Aug
    • S. Chandrasekhar and M. Singhal, "Efficient and scalable query authentication for cloud-based storage systems with multiple data sources, " IEEE Trans. Services Comput., vol. 10, no. 4, pp. 520-533, Jul./Aug. 2017.
    • (2017) IEEE Trans. Services Comput , vol.10 , Issue.4 , pp. 520-533
    • Chandrasekhar, S.1    Singhal, M.2
  • 84
    • 85014537568 scopus 로고    scopus 로고
    • Provably secure authenticated key agreement scheme for smart grid
    • to be published
    • V. Odelu, A. K. Das, M. Wazid, and M. Conti, "Provably secure authenticated key agreement scheme for smart grid, " IEEE Trans. Smart Grid, to be published.
    • IEEE Trans. Smart Grid
    • Odelu, V.1    Das, A.K.2    Wazid, M.3    Conti, M.4
  • 85
    • 84870429369 scopus 로고    scopus 로고
    • EMAP: Expedite message authentication protocol for vehicular ad hoc networks
    • Jan
    • A. Wasef and X. Shen, "EMAP: Expedite message authentication protocol for vehicular ad hoc networks, " IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 78-89, Jan. 2013.
    • (2013) IEEE Trans. Mobile Comput , vol.12 , Issue.1 , pp. 78-89
    • Wasef, A.1    Shen, X.2
  • 86
    • 85008263167 scopus 로고    scopus 로고
    • An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
    • Dec
    • Q. Jiang et al., "An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks, " J. Netw. Comput. Appl., vol. 76, pp. 37-48, Dec. 2016.
    • (2016) J. Netw. Comput. Appl , vol.76 , pp. 37-48
    • Jiang, Q.1
  • 87
    • 85020469257 scopus 로고    scopus 로고
    • Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things
    • Oct
    • P. Hu et al., "Security and privacy preservation scheme of face identification and resolution framework using fog computing in Internet of Things, " IEEE Internet Things J., vol. 4, no. 5, pp. 1143-1155, Oct. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.5 , pp. 1143-1155
    • Hu, P.1
  • 88
    • 85020858950 scopus 로고    scopus 로고
    • Securing SDN infrastructure of IoT-fog networks from MitM attacks
    • Oct
    • C. Li, Z. Qin, E. Novak, and Q. Li, "Securing SDN infrastructure of IoT-fog networks from MitM attacks, " IEEE Internet Things J., vol. 4, no. 5, pp. 1156-1164, Oct. 2017.
    • (2017) IEEE Internet Things J , vol.4 , Issue.5 , pp. 1156-1164
    • Li, C.1    Qin, Z.2    Novak, E.3    Li, Q.4
  • 89
    • 84884387687 scopus 로고    scopus 로고
    • Achieving efficient cooperative message authentication in vehicular ad hoc networks
    • Sep
    • X. Lin and X. Li, "Achieving efficient cooperative message authentication in vehicular ad hoc networks, " IEEE Trans. Veh. Technol., vol. 62, no. 7, pp. 3339-3348, Sep. 2013.
    • (2013) IEEE Trans. Veh. Technol , vol.62 , Issue.7 , pp. 3339-3348
    • Lin, X.1    Li, X.2
  • 90
    • 84929376476 scopus 로고    scopus 로고
    • PSMPA: Patient selfcontrollable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system
    • Jun
    • J. Zhou, X. Lin, X. Dong, and Z. Cao, "PSMPA: Patient selfcontrollable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1693-1703, Jun. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst , vol.26 , Issue.6 , pp. 1693-1703
    • Zhou, J.1    Lin, X.2    Dong, X.3    Cao, Z.4
  • 91
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in VANETs
    • Jan
    • R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in VANETs, " IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86-96, Jan. 2012.
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, T.H.3    Liang, X.4    Shen, X.5
  • 92
    • 84959016733 scopus 로고    scopus 로고
    • Short randomizable signatures
    • San Francisco, CA, USA
    • D. Pointcheval and O. Sanders, "Short randomizable signatures, " in Proc. CT RSA, San Francisco, CA, USA, 2016, pp. 111-126.
    • (2016) Proc. CT RSA , pp. 111-126
    • Pointcheval, D.1    Sanders, O.2
  • 93
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: Efficient full-domain K-anonymity
    • Baltimore, MD, USA
    • K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, "Incognito: Efficient full-domain K-anonymity, " in Proc. SIGMOD, Baltimore, MD, USA, 2005, pp. 49-60.
    • (2005) Proc. SIGMOD , pp. 49-60
    • Lefevre, K.1    Dewitt, D.J.2    Ramakrishnan, R.3
  • 94
    • 70449632682 scopus 로고    scopus 로고
    • De-anonymizing social networks
    • Berkeley, CA, USA
    • A. Narayanan and V. Shmatikov, "De-anonymizing social networks, " in Proc. IEEE S P, Berkeley, CA, USA, 2009, pp. 173-187.
    • (2009) Proc. IEEE S P , pp. 173-187
    • Narayanan, A.1    Shmatikov, V.2
  • 95
    • 85042733564 scopus 로고    scopus 로고
    • Access control issues in utilizing fog computing for transport infrastructure
    • S. Salonikias, I. Mavridis, and D. Gritzalis, "Access control issues in utilizing fog computing for transport infrastructure, " in Proc. CRITIS, 2015, pp. 15-26.
    • (2015) Proc. CRITIS , pp. 15-26
    • Salonikias, S.1    Mavridis, I.2    Gritzalis, D.3
  • 96
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • Tallinn, Estonia
    • A. Lewko and B. Waters, "Decentralizing attribute-based encryption, " in Proc. EUROCRYPT, Tallinn, Estonia, 2011, pp. 568-588.
    • (2011) Proc. EUROCRYPT , pp. 568-588
    • Lewko, A.1    Waters, B.2
  • 98
    • 84899413588 scopus 로고    scopus 로고
    • Going beyond mobile device management
    • P. Steiner, "Going beyond mobile device management, " Comput. Fraud Security, vol. 2014, no. 4, pp. 19-20, 2014.
    • (2014) Comput. Fraud Security , vol.2014 , Issue.4 , pp. 19-20
    • Steiner, P.1
  • 99
    • 84997770188 scopus 로고    scopus 로고
    • Device-invisible two-factor authenticated key agreement protocol for BYOD
    • Chengdu, China
    • J. Ni, X. Lin, K. Zhang, Y. Yu, and X. S. Shen, "Device-invisible two-factor authenticated key agreement protocol for BYOD, " in Proc. ICCC, Chengdu, China, 2016, pp. 1-6.
    • (2016) Proc. ICCC , pp. 1-6
    • Ni, J.1    Lin, X.2    Zhang, K.3    Yu, Y.4    Shen, X.S.5
  • 100
    • 85045645856 scopus 로고    scopus 로고
    • Towards fast and lightweight spam account detection in mobile social networks through tog computing
    • J. Zhang, Q. Li, X. Wang, B. Feng, and D. Guo, "Towards fast and lightweight spam account detection in mobile social networks through tog computing, " Peer Peer Netw. Appl., 2017.
    • (2017) Peer Peer Netw. Appl
    • Zhang, J.1    Li, Q.2    Wang, X.3    Feng, B.4    Guo, D.5
  • 102
    • 85042698973 scopus 로고    scopus 로고
    • Final lightweight cryptography status report
    • "Final lightweight cryptography status report, " Eur. Netw. Excellence Cryptol. II, Tech. Rep., 2012. [Online]. Available: http://www.ecrypt.eu.org/ecrypt2/documents/D.SYM.12.pdf
    • (2012) Eur. Netw. Excellence Cryptol. II, Tech. Rep
  • 103
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion detection for grid and cloud computing
    • Jul./Aug
    • K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusion detection for grid and cloud computing, " IEEE IT Prof. Mag., vol. 12, no. 4, pp. 38-43, Jul./Aug. 2010.
    • (2010) IEEE IT Prof. Mag , vol.12 , Issue.4 , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westphall, C.3    Westphall, C.4
  • 104
    • 84870672469 scopus 로고    scopus 로고
    • An abstract model for integrated intrusion detection and severity analysis for clouds
    • J. Xu, J. Arshad, and P. Townend, "An abstract model for integrated intrusion detection and severity analysis for clouds, " Int. J. Cloud Appl. Comput., vol. 1, no. 1, pp. 1-17, 2011.
    • (2011) Int. J. Cloud Appl. Comput , vol.1 , Issue.1 , pp. 1-17
    • Xu, J.1    Arshad, J.2    Townend, P.3
  • 105
    • 84870697197 scopus 로고    scopus 로고
    • Managing intrusion detection as a service in cloud networks
    • H. Hamad and M. A. Hoby, "Managing intrusion detection as a service in cloud networks, " Int. J. Comput. Appl., vol. 41, no. 1, pp. 35-40, 2012.
    • (2012) Int. J. Comput. Appl , vol.41 , Issue.1 , pp. 35-40
    • Hamad, H.1    Hoby, M.A.2
  • 106
    • 80052184968 scopus 로고    scopus 로고
    • A cloud-based intrusion detection and response system for mobile phones
    • A. Houmansadr, S. A. Zonouz, and R. Berthier, "A cloud-based intrusion detection and response system for mobile phones, " in Proc. DSNW, 2011, pp. 31-32.
    • (2011) Proc. DSNW , pp. 31-32
    • Houmansadr, A.1    Zonouz, S.A.2    Berthier, R.3
  • 107
    • 77949590054 scopus 로고    scopus 로고
    • Distributed intrusion detection in clouds using mobile agents
    • Sliema, Malta
    • A. V. Dastjerdi, K. A. Bakar, and S. G. H. Tabatabaei, "Distributed intrusion detection in clouds using mobile agents, " in Proc. ADVCOMP, Sliema, Malta, 2009, pp. 175-180.
    • (2009) Proc. ADVCOMP , pp. 175-180
    • Dastjerdi, A.V.1    Bakar, K.A.2    Tabatabaei, S.G.H.3
  • 108
    • 84870661024 scopus 로고    scopus 로고
    • Secure cloud computing based on mutual intrusion detection system
    • S. Ram, "Secure cloud computing based on mutual intrusion detection system, " Int. J. Comput. Appl., vol. 2, no. 1, pp. 57-67, 2012.
    • (2012) Int. J. Comput. Appl , vol.2 , Issue.1 , pp. 57-67
    • Ram, S.1
  • 109
    • 85013421978 scopus 로고    scopus 로고
    • Secure intelligent traffic light control using fog computing
    • Jan
    • J. Liu et al., "Secure intelligent traffic light control using fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 817-824, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 817-824
    • Liu, J.1
  • 110
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Chicago, IL, USA
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM CCS, Chicago, IL, USA, 2009, pp. 21-32.
    • (2009) Proc. ACM CCS , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 111
    • 77953317298 scopus 로고    scopus 로고
    • Sybil attacks against mobile users: Friends and foes to the rescue
    • San Diego, CA, USA
    • D. Quercia and S. Hailes, "Sybil attacks against mobile users: Friends and foes to the rescue, " in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 336-340.
    • (2010) Proc. IEEE INFOCOM , pp. 336-340
    • Quercia, D.1    Hailes, S.2
  • 112
    • 84875667207 scopus 로고    scopus 로고
    • Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support
    • S. Park, B. Aslam, D. Turgut, and C. C. Zou, "Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support, " Security Commun. Netw., vol. 6, no. 4, pp. 523-538, 2013.
    • (2013) Security Commun. Netw , vol.6 , Issue.4 , pp. 523-538
    • Park, S.1    Aslam, B.2    Turgut, D.3    Zou, C.C.4
  • 113
    • 84902197946 scopus 로고    scopus 로고
    • LSR: Mitigating zero-day Sybil vulnerability in privacypreserving vehicular peer-to-peer networks
    • Sep
    • X. Lin, "LSR: Mitigating zero-day Sybil vulnerability in privacypreserving vehicular peer-to-peer networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 237-246, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun , vol.31 , Issue.9 , pp. 237-246
    • Lin, X.1
  • 114
    • 84891775418 scopus 로고    scopus 로고
    • Enabling trustworthy service evaluation in service-oriented mobile social networks
    • Feb
    • X. Liang, X. Lin, and X. S. Shen, "Enabling trustworthy service evaluation in service-oriented mobile social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 310-320, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.2 , pp. 310-320
    • Liang, X.1    Lin, X.2    Shen, X.S.3
  • 115
    • 33947387917 scopus 로고    scopus 로고
    • Trust management in distributed systems
    • Feb
    • H. Li and M. Singhal, "Trust management in distributed systems, " IEEE Comput., vol. 40, no. 2, pp. 45-53, Feb. 2007.
    • (2007) IEEE Comput , vol.40 , Issue.2 , pp. 45-53
    • Li, H.1    Singhal, M.2
  • 116
    • 84899101836 scopus 로고    scopus 로고
    • A survey of multi-agent trust management systems
    • H. Yu, Z. Shen, C. Leung, C. Miao, and V. R. Lesser, "A survey of multi-agent trust management systems, " IEEE Access, vol. 1, pp. 35-50, 2013.
    • (2013) IEEE Access , vol.1 , pp. 35-50
    • Yu, H.1    Shen, Z.2    Leung, C.3    Miao, C.4    Lesser, V.R.5
  • 117
    • 84909606246 scopus 로고    scopus 로고
    • Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning
    • Nov
    • Z. Wei, H. Tang, F. R. Yu, M. Wang, and P. Mason, "Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning, " IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4647-4658, Nov. 2014.
    • (2014) IEEE Trans. Veh. Technol , vol.63 , Issue.9 , pp. 4647-4658
    • Wei, Z.1    Tang, H.2    Yu, F.R.3    Wang, M.4    Mason, P.5
  • 118
    • 85040585906 scopus 로고    scopus 로고
    • Toward architectural and protocol-level foundation for end-to-end trustworthiness in cloud/fog computing
    • to be published
    • Z. Su et al., "Toward architectural and protocol-level foundation for end-to-end trustworthiness in cloud/fog computing, " IEEE Trans. Big Data, to be published.
    • IEEE Trans. Big Data
    • Su, Z.1
  • 119
    • 33748767370 scopus 로고    scopus 로고
    • An entropy-based approach to protecting rating systems from unfair testimonies
    • Sep
    • J. Weng, C. Miao, and A. Goh, "An entropy-based approach to protecting rating systems from unfair testimonies, " IEICE Trans. Inf. Syst., vol. E89-D, no. 9, pp. 2502-2511, Sep. 2006.
    • (2006) IEICE Trans. Inf. Syst , vol.E89-D , Issue.9 , pp. 2502-2511
    • Weng, J.1    Miao, C.2    Goh, A.3
  • 120
    • 84901027315 scopus 로고    scopus 로고
    • Trustworthiness management in the social Internet of Things
    • May
    • M. Nitti, R. Girau, and L. Atzori, "Trustworthiness management in the social Internet of Things, " IEEE Trans. Knowl. Data Eng., vol. 26, no. 5, pp. 1253-1266, May 2014.
    • (2014) IEEE Trans. Knowl. Data Eng , vol.26 , Issue.5 , pp. 1253-1266
    • Nitti, M.1    Girau, R.2    Atzori, L.3
  • 121
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • 4th Quart
    • J.-H. Cho, A. Swami, and I.-R. Chen, "A survey on trust management for mobile ad hoc networks, " IEEE Commun. Surveys Tuts., vol. 13, no. 4, pp. 562-583, 4th Quart., 2011.
    • (2011) IEEE Commun. Surveys Tuts , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.-H.1    Swami, A.2    Chen, I.-R.3
  • 122
    • 84869449753 scopus 로고    scopus 로고
    • A reputationbased announcement scheme for VANETs
    • Nov
    • Q. Li, A. Malip, K. M. Martin, S.-L. Ng, and J. Zhang, "A reputationbased announcement scheme for VANETs, " IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4095-4108, Nov. 2012.
    • (2012) IEEE Trans. Veh. Technol , vol.61 , Issue.9 , pp. 4095-4108
    • Li, Q.1    Malip, A.2    Martin, K.M.3    Ng, S.-L.4    Zhang, J.5
  • 123
    • 84896101663 scopus 로고    scopus 로고
    • Dynamic trust management for delay tolerant networks and its application to secure routing
    • May
    • I.-R. Chen, F. Bao, M. J. Chang, and J.-H. Cho, "Dynamic trust management for delay tolerant networks and its application to secure routing, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 5, pp. 1200-1210, May 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.5 , pp. 1200-1210
    • Chen, I.-R.1    Bao, F.2    Chang, M.J.3    Cho, J.-H.4
  • 124
    • 84930081899 scopus 로고    scopus 로고
    • SACRM: Social aware crowdsourcing with reputation management in mobile sensing
    • Jul
    • J. Ren, Y. Zhang, K. Zhang, and X. Shen, "SACRM: Social aware crowdsourcing with reputation management in mobile sensing, " Comput. Commun., vol. 65, pp. 55-65, Jul. 2015.
    • (2015) Comput. Commun , vol.65 , pp. 55-65
    • Ren, J.1    Zhang, Y.2    Zhang, K.3    Shen, X.4
  • 125
    • 84969847954 scopus 로고    scopus 로고
    • Twenty security considerations for cloud-supported Internet of Things
    • Jun
    • J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, "Twenty security considerations for cloud-supported Internet of Things, " IEEE Internet Things J., vol. 3, no. 3, pp. 269-284, Jun. 2015.
    • (2015) IEEE Internet Things J , vol.3 , Issue.3 , pp. 269-284
    • Singh, J.1    Pasquier, T.2    Bacon, J.3    Ko, H.4    Eyers, D.5
  • 126
    • 84861957968 scopus 로고    scopus 로고
    • Toward secure and dependable storage services in cloud computing
    • Apr./Jun
    • C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward secure and dependable storage services in cloud computing, " IEEE Trans. Services Comput., vol. 5, no. 2, pp. 220-232, Apr./Jun. 2012.
    • (2012) IEEE Trans. Services Comput , vol.5 , Issue.2 , pp. 220-232
    • Wang, C.1    Wang, Q.2    Ren, K.3    Cao, N.4    Lou, W.5
  • 127
    • 85014919981 scopus 로고    scopus 로고
    • Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
    • Apr
    • Y. Yu et al., "Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage, " IEEE Trans. Inf. Forensics Security, vol. 12, no. 4, pp. 767-778, Apr. 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.4 , pp. 767-778
    • Yu, Y.1
  • 128
    • 84869466694 scopus 로고    scopus 로고
    • Cooperative provable data possession for integrity verification in multicloud storage
    • Dec
    • Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multicloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231-2244, Dec. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst , vol.23 , Issue.12 , pp. 2231-2244
    • Zhu, Y.1    Hu, H.2    Ahn, G.-J.3    Yu, M.4
  • 129
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Espoo, Finland
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in Proc. EUROCRYPT, Espoo, Finland, 1998, pp. 127-144.
    • (1998) Proc. EUROCRYPT , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 130
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage, " ACM Trans. Inf. Syst. Security, vol. 9, no. 1, pp. 1-30, 2006.
    • (2006) ACM Trans. Inf. Syst. Security , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 131
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • Alexandria, VA, USA
    • R. Canetti and S. Hohenberger, "Chosen-ciphertext secure proxy re-encryption, " in Proc. ACM CCS, Alexandria, VA, USA, 2007, pp. 185-194.
    • (2007) Proc. ACM CCS , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 132
    • 77952320634 scopus 로고    scopus 로고
    • Conditional proxy re-encryption secure against chosen-ciphertext attack
    • Sydney, NSW, Australia
    • J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, "Conditional proxy re-encryption secure against chosen-ciphertext attack, " in Proc. ACM ASIACCS, Sydney, NSW, Australia, 2009, pp. 322-332.
    • (2009) Proc. ACM ASIACCS , pp. 322-332
    • Weng, J.1    Deng, R.H.2    Ding, X.3    Chu, C.-K.4    Lai, J.5
  • 133
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Aarhus, Denmark
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption, " in Proc. EUROCRYPT, Aarhus, Denmark, 2005, pp. 457-473.
    • (2005) Proc. EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 134
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attributebased encryption
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption, " in Proc. IEEE S P, 2007, pp. 321-334.
    • (2007) Proc. IEEE S P , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 135
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • Alexandria, VA, USA
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. ACM CCS, Alexandria, VA, USA, 2006, pp. 89-98.
    • (2006) Proc. ACM CCS , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 136
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • Chicago, IL, USA
    • G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, " in Proc. ACM CCS, Chicago, IL, USA, 2010, pp. 735-737.
    • (2010) Proc. ACM CCS , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 137
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
    • Jan
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 138
    • 85028769994 scopus 로고    scopus 로고
    • An attribute-based encryption scheme to secure fog communications
    • A. Alrawais, A. Alhothaily, C. Hu, X. Xing, and X. Cheng, "An attribute-based encryption scheme to secure fog communications, " IEEE Access, vol. 5, pp. 9131-9138, 2017.
    • (2017) IEEE Access , vol.5 , pp. 9131-9138
    • Alrawais, A.1    Alhothaily, A.2    Hu, C.3    Xing, X.4    Cheng, X.5
  • 139
    • 85042685240 scopus 로고    scopus 로고
    • Attribute-based secure data sharing with efficient revocation in fog computing
    • A. Alotaibi, A. Barnawi, and M. Buhari, "Attribute-based secure data sharing with efficient revocation in fog computing, " Int. J. Inf. Security, vol. 8, no. 3, pp. 203-222, 2017.
    • (2017) Int. J. Inf. Security , vol.8 , Issue.3 , pp. 203-222
    • Alotaibi, A.1    Barnawi, A.2    Buhari, M.3
  • 140
    • 85011878988 scopus 로고    scopus 로고
    • Ciphertext-policy attributebased encryption against key-delegation abuse in fog computing
    • Jan
    • Y. Jiang, W. Susilo, Y. Mu, and F. Guo, "Ciphertext-policy attributebased encryption against key-delegation abuse in fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 720-729, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 720-729
    • Jiang, Y.1    Susilo, W.2    Mu, Y.3    Guo, F.4
  • 141
    • 85011802339 scopus 로고    scopus 로고
    • Towards leakageresilient fine-grained access control in fog computing
    • Jan
    • Z. Yu, M. H. Au, Q. Xu, R. Yang, and J. Han, "Towards leakageresilient fine-grained access control in fog computing, " Future Gener. Comput. Syst., vol. 78, pp. 763-777, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 763-777
    • Yu, Z.1    Au, M.H.2    Xu, Q.3    Yang, R.4    Han, J.5
  • 142
    • 84891807562 scopus 로고    scopus 로고
    • Key-aggregate cryptosystem for scalable data sharing in cloud storage
    • Feb
    • C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, "Key-aggregate cryptosystem for scalable data sharing in cloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 468-477, Feb. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.2 , pp. 468-477
    • Chu, C.-K.1    Chow, S.S.M.2    Tzeng, W.-G.3    Zhou, J.4    Deng, R.H.5
  • 143
    • 84978741646 scopus 로고    scopus 로고
    • Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage
    • Aug
    • B. Cui, Z. Liu, and L. Wang, "Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage, " IEEE Trans. Comput., vol. 65, no. 8, pp. 2374-2385, Aug. 2014.
    • (2014) IEEE Trans. Comput , vol.65 , Issue.8 , pp. 2374-2385
    • Cui, B.1    Liu, Z.2    Wang, L.3
  • 144
    • 84959145270 scopus 로고    scopus 로고
    • Time-bound keyaggregate encryption for cloud storage
    • C.-C. Lee, C.-T. Li, S.-T. Chiu, and S.-D. Chen, "Time-bound keyaggregate encryption for cloud storage, " Security Commun. Netw., vol. 9, no. 13, pp. 2059-2069, 2016.
    • (2016) Security Commun. Netw , vol.9 , Issue.13 , pp. 2059-2069
    • Lee, C.-C.1    Li, C.-T.2    Chiu, S.-T.3    Chen, S.-D.4
  • 145
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Prague, Czech Republic
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. EUROCRYPT, Prague, Czech Republic, 1999, pp. 223-238.
    • (1999) Proc. EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 146
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • Cambridge, MA, USA
    • D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF formulas on ciphertexts, " in Proc. TCC, Cambridge, MA, USA, 2005, pp. 325-341.
    • (2005) Proc. TCC , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 147
    • 84861649075 scopus 로고    scopus 로고
    • Fine-grained private matching for proximity-based mobile social networking
    • Orlando, FL, USA
    • R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. INFOCOM, Orlando, FL, USA, 2012, pp. 1969-1977.
    • (2012) Proc. INFOCOM , pp. 1969-1977
    • Zhang, R.1    Zhang, Y.2    Sun, J.3    Yan, G.4
  • 148
    • 84883345595 scopus 로고    scopus 로고
    • Fully anonymous profile matching in mobile social networks
    • Sep
    • X. Liang et al., "Fully anonymous profile matching in mobile social networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 641-655, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun , vol.31 , Issue.9 , pp. 641-655
    • Liang, X.1
  • 149
    • 85029554588 scopus 로고    scopus 로고
    • Differentially private smart metering with fault tolerance and range-based filtering
    • Sep
    • J. Ni et al., "Differentially private smart metering with fault tolerance and range-based filtering, " IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2483-2493, Sep. 2017.
    • (2017) IEEE Trans. Smart Grid , vol.8 , Issue.5 , pp. 2483-2493
    • Ni, J.1
  • 150
    • 85018495637 scopus 로고    scopus 로고
    • A lightweight privacy-preserving data aggregation scheme for fog computingenhanced IoT
    • R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for fog computingenhanced IoT, " IEEE Access, vol. 5, pp. 3302-3312, 2017.
    • (2017) IEEE Access , vol.5 , pp. 3302-3312
    • Lu, R.1    Heung, K.2    Lashkari, A.H.3    Ghorbani, A.A.4
  • 151
    • 85014042880 scopus 로고    scopus 로고
    • Anonymous and secure aggregation scheme in fog-based public cloud computing
    • Jan
    • H. Wang, Z. Wang, and J. Domingo-Ferrer, "Anonymous and secure aggregation scheme in fog-based public cloud computing, " Future Gener. Comput. Syst., vol. 78, pp. 712-719, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 712-719
    • Wang, H.1    Wang, Z.2    Domingo-Ferrer, J.3
  • 152
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Bethesda, MD, USA
    • C. Gentry, "Fully homomorphic encryption using ideal lattices, " in Proc. STOC, Bethesda, MD, USA, 2009, pp. 169-178.
    • (2009) Proc. STOC , pp. 169-178
    • Gentry, C.1
  • 154
    • 84983314455 scopus 로고    scopus 로고
    • Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing
    • San Francisco, CA, USA
    • G. Zhuo, Q. Jia, L. Guo, M. Li, and P. Li, "Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing, " in Proc. IEEE INFOCOM, San Francisco, CA, USA, 2016, pp. 1-9.
    • (2016) Proc. IEEE INFOCOM , pp. 1-9
    • Zhuo, G.1    Jia, Q.2    Guo, L.3    Li, M.4    Li, P.5
  • 155
    • 84929457217 scopus 로고    scopus 로고
    • Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions
    • Apr
    • J. Zhou, Z. Cao, X. Dong, and X. Lin, "Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions, " IEEE Wireless Commun., vol. 22, no. 2, pp. 136-144, Apr. 2015.
    • (2015) IEEE Wireless Commun , vol.22 , Issue.2 , pp. 136-144
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Lin, X.4
  • 156
    • 84865498118 scopus 로고    scopus 로고
    • Secure key distribution for the smart grid
    • Sep
    • J. Xia and Y. Wang, "Secure key distribution for the smart grid, " IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1437-1443, Sep. 2012.
    • (2012) IEEE Trans. Smart Grid , vol.3 , Issue.3 , pp. 1437-1443
    • Xia, J.1    Wang, Y.2
  • 157
    • 84981313477 scopus 로고    scopus 로고
    • EDAT: Efficient data aggregation without TTP for privacy-assured smart metering
    • Kuala Lumpur, Malaysia
    • J. Ni, K. Zhang, X. Lin, and X. S. Shen, "EDAT: Efficient data aggregation without TTP for privacy-assured smart metering, " in Proc. ICC, Kuala Lumpur, Malaysia, 2016, pp. 1-6.
    • (2016) Proc. ICC , pp. 1-6
    • Ni, J.1    Zhang, K.2    Lin, X.3    Shen, X.S.4
  • 158
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Warsaw, Poland
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps, " in Proc. EUROCRYPT, Warsaw, Poland, 2003, pp. 416-432.
    • (2003) Proc. EUROCRYPT , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 159
    • 61849086789 scopus 로고    scopus 로고
    • A new certificateless aggregate signature scheme
    • L. Zhang and F. Zhang, "A new certificateless aggregate signature scheme, " Comput. Commun., vol. 32, no. 6, pp. 1079-1085, 2009.
    • (2009) Comput. Commun , vol.32 , Issue.6 , pp. 1079-1085
    • Zhang, L.1    Zhang, F.2
  • 160
    • 84876794518 scopus 로고    scopus 로고
    • Identity-based multi-signatures from RSA
    • San Francisco, CA, USA
    • M. Bellare and G. Neven, "Identity-based multi-signatures from RSA, " in Proc. CT RSA, San Francisco, CA, USA, 2006, pp. 145-162.
    • (2006) Proc. CT RSA , pp. 145-162
    • Bellare, M.1    Neven, G.2
  • 161
    • 33746066354 scopus 로고    scopus 로고
    • Sequential aggregate signatures and multisignatures without random Oracles
    • St. Petersburg, Russia
    • S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters, "Sequential aggregate signatures and multisignatures without random Oracles, " in Proc. EUROCRYPT, St. Petersburg, Russia, 2006, pp. 465-485.
    • (2006) Proc. EUROCRYPT , pp. 465-485
    • Lu, S.1    Ostrovsky, R.2    Sahai, A.3    Shacham, H.4    Waters, B.5
  • 162
    • 84994828087 scopus 로고    scopus 로고
    • Key-homomorphic signatures and applications to multiparty signatures
    • D. Derler and D. Slamanig, "Key-homomorphic signatures and applications to multiparty signatures, " Cryptol. ePrint Arch., Tech. Rep. 792, 2016. [Online]. Available: https://eprint.iacr.org/2016/792.pdf
    • (2016) Cryptol. EPrint Arch., Tech. Rep , vol.792
    • Derler, D.1    Slamanig, D.2
  • 163
    • 85015396702 scopus 로고    scopus 로고
    • Secure and deduplicated spatial crowdsourcing: A fog-based approach
    • Washington, DC, USA
    • J. Ni, X. Lin, K. Zhang, and Y. Yu, "Secure and deduplicated spatial crowdsourcing: A fog-based approach, " in Proc. Globecom, Washington, DC, USA, 2016, pp. 1-6.
    • (2016) Proc. Globecom , pp. 1-6
    • Ni, J.1    Lin, X.2    Zhang, K.3    Yu, Y.4
  • 164
    • 78649998784 scopus 로고    scopus 로고
    • Synchronized aggregate signatures: New definitions, constructions and applications
    • Chicago, IL, USA
    • J. H. Ahn, M. Green, and S. Hohenberger, "Synchronized aggregate signatures: New definitions, constructions and applications, " in Proc. ACM CCS, Chicago, IL, USA, 2010, pp. 473-484.
    • (2010) Proc. ACM CCS , pp. 473-484
    • Ahn, J.H.1    Green, M.2    Hohenberger, S.3
  • 165
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • Berkeley, CA, USA
    • D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data, " in Proc. IEEE S P, Berkeley, CA, USA, 2000, pp. 44-55.
    • (2000) Proc. IEEE S P , pp. 44-55
    • Song, D.X.1    Wagner, D.2    Perrig, A.3
  • 166
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • San Diego, CA, USA
    • J. Li et al., "Fuzzy keyword search over encrypted data in cloud computing, " in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 441-445.
    • (2010) Proc. IEEE INFOCOM , pp. 441-445
    • Li, J.1
  • 167
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • Genoa, Italy
    • C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. ICDCS, Genoa, Italy, 2010, pp. 253-262.
    • (2010) Proc. ICDCS , pp. 253-262
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 168
    • 84957071710 scopus 로고    scopus 로고
    • ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes
    • Denver, CO, USA
    • P. Rizomiliotis and S. Gritzalis, "ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes, " in Proc. CCSW, Denver, CO, USA, 2015, pp. 65-76.
    • (2015) Proc. CCSW , pp. 65-76
    • Rizomiliotis, P.1    Gritzalis, S.2
  • 169
    • 84914140074 scopus 로고    scopus 로고
    • Dynamic searchable encryption via blind storage
    • Berkeley, CA, USA
    • M. Naveed, M. Prabhakaran, and C. A. Gunter, "Dynamic searchable encryption via blind storage, " in Proc. IEEE S P, Berkeley, CA, USA, 2014, pp. 639-654.
    • (2014) Proc. IEEE S P , pp. 639-654
    • Naveed, M.1    Prabhakaran, M.2    Gunter, C.A.3
  • 170
    • 85023750059 scopus 로고    scopus 로고
    • A fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based service
    • X. Yang, F. Yin, and X. Tang, "A fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based service, " Sensors, vol. 17, no. 7, p. 1611, 2017.
    • (2017) Sensors , vol.17 , Issue.7 , pp. 1611
    • Yang, X.1    Yin, F.2    Tang, X.3
  • 171
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Interlaken, Switzerland
    • D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search, " in Proc. EUROCRYPT, Interlaken, Switzerland, 2004, pp. 506-522.
    • (2004) Proc. EUROCRYPT , pp. 506-522
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 172
    • 71549160150 scopus 로고    scopus 로고
    • Improved searchable public key encryption with designated tester
    • Sydney, NSW, Australia
    • H. S. Rhee, J. H. Park, W. Susilo, and D. H. Lee, "Improved searchable public key encryption with designated tester, " in Proc. ASIACCS, Sydney, NSW, Australia, 2009, pp. 376-379.
    • (2009) Proc. ASIACCS , pp. 376-379
    • Rhee, H.S.1    Park, J.H.2    Susilo, W.3    Lee, D.H.4
  • 173
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Tokyo, Japan
    • Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system, " in Proc. Pairing, Tokyo, Japan, 2007, pp. 2-22.
    • (2007) Proc. Pairing , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 174
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Istanbul, Turkey
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products, " in Proc. EUROCRYPT, Istanbul, Turkey, 2008, pp. 146-162.
    • (2008) Proc. EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 175
    • 52149090559 scopus 로고    scopus 로고
    • Hidden-vector encryption with groups of prime order
    • Beijing, China
    • V. Iovino and G. Persiano, "Hidden-vector encryption with groups of prime order, " in Proc. Pairing, Beijing, China, 2008, pp. 75-88.
    • (2008) Proc. Pairing , pp. 75-88
    • Iovino, V.1    Persiano, G.2
  • 176
    • 85179556059 scopus 로고    scopus 로고
    • Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
    • San Diego, CA, USA
    • M. S. Islam, M. Kuzu, and M. Kantarcioglu, "Access pattern disclosure on searchable encryption: Ramification, attack and mitigation, " in Proc. NDSS, San Diego, CA, USA, 2012, pp. 1-15.
    • (2012) Proc. NDSS , pp. 1-15
    • Islam, M.S.1    Kuzu, M.2    Kantarcioglu, M.3
  • 177
    • 84910594273 scopus 로고    scopus 로고
    • Searchable encryption with secure and efficient updates
    • Scottsdale, AZ, USA
    • F. Hahn and F. Kerschbaum, "Searchable encryption with secure and efficient updates, " in Proc. ACM CCS, Scottsdale, AZ, USA, 2014, pp. 310-320.
    • (2014) Proc. ACM CCS , pp. 310-320
    • Hahn, F.1    Kerschbaum, F.2
  • 178
    • 85094635733 scopus 로고    scopus 로고
    • An architecture for a secure service discovery service
    • Seattle, WA, USA
    • S. E. Czerwinski, B. Y. Zhao, T. D. Hodes, A. D. Joseph, and R. H. Katz, "An architecture for a secure service discovery service, " in Proc. MobiCom, Seattle, WA, USA, 1999, pp. 24-35.
    • (1999) Proc. MobiCom , pp. 24-35
    • Czerwinski, S.E.1    Zhao, B.Y.2    Hodes, T.D.3    Joseph, A.D.4    Katz, R.H.5
  • 179
    • 84990841451 scopus 로고    scopus 로고
    • Privacy, discovery, and authentication for the Internet of Things
    • Oslo, Norway
    • D. J. Wu, A. Taly, A. Shankar, and D. Boneh, "Privacy, discovery, and authentication for the Internet of Things, " in Proc. ESORICS, Oslo, Norway, 2016, pp. 301-319.
    • (2016) Proc. ESORICS , pp. 301-319
    • Wu, D.J.1    Taly, A.2    Shankar, A.3    Boneh, D.4
  • 180
    • 50549101800 scopus 로고    scopus 로고
    • Public key broadcast encryption schemes with shorter transmissions
    • Sep
    • J. H. Park, H. J. Kim, M. H. Sung, and D. H. Lee, "Public key broadcast encryption schemes with shorter transmissions, " IEEE Trans. Broadcast., vol. 54, no. 3, pp. 401-411, Sep. 2008.
    • (2008) IEEE Trans. Broadcast , vol.54 , Issue.3 , pp. 401-411
    • Park, J.H.1    Kim, H.J.2    Sung, M.H.3    Lee, D.H.4
  • 181
    • 0034238689 scopus 로고    scopus 로고
    • Key management for restricted multicast using broadcast encryption
    • Aug
    • M. Abdalla, Y. Shavitt, and A. Wool, "Key management for restricted multicast using broadcast encryption, " IEEE/ACM Trans. Netw., vol. 8, no. 4, pp. 443-454, Aug. 2000.
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.4 , pp. 443-454
    • Abdalla, M.1    Shavitt, Y.2    Wool, A.3
  • 182
    • 33646870054 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Santa Barbara, CA, USA
    • D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys, " in Proc. CRYPTO, Santa Barbara, CA, USA, 2005, pp. 258-275.
    • (2005) Proc. CRYPTO , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 183
    • 84861702751 scopus 로고    scopus 로고
    • Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
    • Darmstadt, Germany
    • B. Libert, K. G. Paterson, and E. A. Quaglia, "Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model, " in Proc. PKC, Darmstadt, Germany, 2012, pp. 206-224.
    • (2012) Proc. PKC , pp. 206-224
    • Libert, B.1    Paterson, K.G.2    Quaglia, E.A.3
  • 184
    • 67349253018 scopus 로고    scopus 로고
    • SAGE: A strong privacy-preserving scheme against global eavesdropping for eHealth systems
    • May
    • X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A strong privacy-preserving scheme against global eavesdropping for eHealth systems, " IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365-378, May 2009.
    • (2009) IEEE J. Sel. Areas Commun , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 185
    • 77953313061 scopus 로고    scopus 로고
    • SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks
    • San Diego, CA, USA
    • R. Lu, X. Lin, and X. Shen, "SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks, " in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 186
    • 79960870810 scopus 로고    scopus 로고
    • STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
    • Shanghai, China
    • X. Lin, R. Lu, X. Liang, and X. Shen, "STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs, " in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 2147-2155.
    • (2011) Proc. IEEE INFOCOM , pp. 2147-2155
    • Lin, X.1    Lu, R.2    Liang, X.3    Shen, X.4
  • 187
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Santa Barbara, CA, USA
    • R. Gennaro, C. Gentry, and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers, " in Proc. CRYPTO, Santa Barbara, CA, USA, 2010, pp. 465-482.
    • (2010) Proc. CRYPTO , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 188
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • Chicago, IL, USA
    • A. C. Yao, "Protocols for secure computations, " in Proc. SFCS, Chicago, IL, USA, 1982, pp. 160-164.
    • (1982) Proc. SFCS , pp. 160-164
    • Yao, A.C.1
  • 189
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • Santa Barbara, CA, USA
    • K.-M. Chung, Y. Kalai, and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption, " in Proc. CRYPTO, Santa Barbara, CA, USA, 2010, pp. 483-501.
    • (2010) Proc. CRYPTO , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 190
    • 84858307151 scopus 로고    scopus 로고
    • How to delegate and verify in public: Verifiable computation from attribute-based encryption
    • Taormina, Italy
    • B. Parno, M. Raykova, and V. Vaikuntanathan, "How to delegate and verify in public: Verifiable computation from attribute-based encryption, " in Proc. TCC, Taormina, Italy, 2012, pp. 422-439.
    • (2012) Proc. TCC , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 191
    • 84873975919 scopus 로고    scopus 로고
    • Signatures of correct computation
    • Tokyo, Japan
    • C. Papamanthou, E. Shi, and R. Tamassia, "Signatures of correct computation, " in Proc. TCC, Tokyo, Japan, 2013, pp. 222-242.
    • (2013) Proc. TCC , pp. 222-242
    • Papamanthou, C.1    Shi, E.2    Tamassia, R.3
  • 192
    • 84873978628 scopus 로고    scopus 로고
    • Multi-client noninteractive verifiable computation
    • Tokyo, Japan
    • S. G. Choi, J. Katz, R. Kumaresan, and C. Cid, "Multi-client noninteractive verifiable computation, " in Proc. TCC, Tokyo, Japan, 2013, pp. 499-518.
    • (2013) Proc. TCC , pp. 499-518
    • Choi, S.G.1    Katz, J.2    Kumaresan, R.3    Cid, C.4
  • 193
    • 84924359626 scopus 로고    scopus 로고
    • Multiclient verifiable computation with stronger security guarantees
    • Warsaw, Poland
    • S. D. Gordon, J. Katz, F.-H. Liu, E. Shi, and H.-S. Zhou, "Multiclient verifiable computation with stronger security guarantees, " in Proc. TCC, Warsaw, Poland, 2015, pp. 144-168.
    • (2015) Proc. TCC , pp. 144-168
    • Gordon, S.D.1    Katz, J.2    Liu, F.-H.3    Shi, E.4    Zhou, H.-S.5
  • 194
    • 84979681531 scopus 로고    scopus 로고
    • Efficient techniques for publicly verifiable delegation of computation
    • Xi'an, China
    • K. Elkhiyaoui, M. Önen, M. Azraoui, and R. Molva, "Efficient techniques for publicly verifiable delegation of computation, " in Proc. ACM CCS, Xi'an, China, 2016, pp. 119-128.
    • (2016) Proc. ACM CCS , pp. 119-128
    • Elkhiyaoui, K.1    Önen, M.2    Azraoui, M.3    Molva, R.4
  • 195
    • 0343951569 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • Santa Barbara, CA, USA
    • T. Matsumoto, K. Kato, and H. Iami, "Speeding up secret computations with insecure auxiliary devices, " in Proc. Crypto, Santa Barbara, CA, USA, 1988, pp. 497-506.
    • (1988) Proc. Crypto , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Iami, H.3
  • 196
    • 0027617773 scopus 로고
    • Fast server-aided secret computation protocols for modular exponentiation
    • Jun
    • S. Kawamura and A. Shimbo, "Fast server-aided secret computation protocols for modular exponentiation, " IEEE J. Sel. Areas Commun., vol. 11, no. 5, pp. 778-784, Jun. 1993.
    • (1993) IEEE J. Sel. Areas Commun , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 197
    • 84951041666 scopus 로고    scopus 로고
    • Efficient and secure delegation of group exponentiation to a single server
    • New York, NY, USA
    • B. Cavallo, G. D. Crescenzo, D. Kahrobaei, and V. Shpilrain, "Efficient and secure delegation of group exponentiation to a single server, " in Proc. RFIDSec, New York, NY, USA, 2015, pp. 156-173.
    • (2015) Proc. RFIDSec , pp. 156-173
    • Cavallo, B.1    Crescenzo, G.D.2    Kahrobaei, D.3    Shpilrain, V.4
  • 198
    • 33646773954 scopus 로고    scopus 로고
    • Server-aided verification: Theory and practice
    • Chennai, India
    • M. Girault and D. Lefranc, "Server-aided verification: Theory and practice, " in Proc. ASIACRYPT, Chennai, India, 2005, pp. 605-623.
    • (2005) Proc. ASIACRYPT , pp. 605-623
    • Girault, M.1    Lefranc, D.2
  • 199
    • 57049172488 scopus 로고    scopus 로고
    • Server-aided verification signatures: Definitions and new constructions
    • Nanjing, China
    • W. Wu, Y. Mu, W. Susilo, and X. Huang, "Server-aided verification signatures: Definitions and new constructions, " in Proc. ProvSec, Nanjing, China, 2008, pp. 141-155.
    • (2008) Proc. ProvSec , pp. 141-155
    • Wu, W.1    Mu, Y.2    Susilo, W.3    Huang, X.4
  • 200
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing, " J. Cryptol., vol. 17, no. 4, pp. 297-319, 2004.
    • (2004) J. Cryptol , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 201
    • 85052022812 scopus 로고    scopus 로고
    • DupLESS: Serveraided encryption for deduplicated storage
    • Washington, DC, USA
    • M. Bellare, S. Keelveedhi, and T. Ristenpart, "DupLESS: Serveraided encryption for deduplicated storage, " in Proc. Usenix Security, Washington, DC, USA, 2014, pp. 179-194.
    • (2014) Proc. Usenix Security , pp. 179-194
    • Bellare, M.1    Keelveedhi, S.2    Ristenpart, T.3
  • 202
    • 84869441394 scopus 로고    scopus 로고
    • Salus: A system for server-aided secure function evaluation
    • Raleigh, NC, USA
    • S. Kamara, P. Mohassel, and B. Riva, "Salus: A system for server-aided secure function evaluation, " in Proc. ACM CCS, Raleigh, NC, USA, 2012, pp. 797-808.
    • (2012) Proc. ACM CCS , pp. 797-808
    • Kamara, S.1    Mohassel, P.2    Riva, B.3
  • 203
    • 33746614258 scopus 로고    scopus 로고
    • Password based server aided key exchange
    • Singapore
    • Y. Cliff, Y. S. T. Tin, and C. Boyd, "Password based server aided key exchange, " in Proc. ACNS, Singapore, 2006, pp. 146-161.
    • (2006) Proc. ACNS , pp. 146-161
    • Cliff, Y.1    Tin, Y.S.T.2    Boyd, C.3
  • 204
    • 85028358232 scopus 로고    scopus 로고
    • Trajectory privacy preservation based on a fog structure for cloud location services
    • T. Wang et al., "Trajectory privacy preservation based on a fog structure for cloud location services, " IEEE Access, vol. 5, pp. 7692-7701, 2017.
    • (2017) IEEE Access , vol.5 , pp. 7692-7701
    • Wang, T.1
  • 205
    • 84979812487 scopus 로고    scopus 로고
    • Big privacy: Challenges and opportunities of privacy study in the age of big data
    • S. Yu, "Big privacy: Challenges and opportunities of privacy study in the age of big data, " IEEE Access, vol. 4, pp. 2751-2763, 2016.
    • (2016) IEEE Access , vol.4 , pp. 2751-2763
    • Yu, S.1
  • 206
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • Venice, Italy
    • C. Dwork, "Differential privacy, " in Proc. ICALP, Venice, Italy, 2006, pp. 1-12.
    • (2006) Proc. ICALP , pp. 1-12
    • Dwork, C.1
  • 207
    • 84971637093 scopus 로고    scopus 로고
    • Privacy-preservingoutsourced association rule mining on vertically partitioned databases
    • Aug
    • L. Li, R. Lu, K.-K. R. Choo, A. Datta, and J. Shao, "Privacy-preservingoutsourced association rule mining on vertically partitioned databases, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 8, pp. 1847-1861, Aug. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.8 , pp. 1847-1861
    • Li, L.1    Lu, R.2    Choo, K.-K.R.3    Datta, A.4    Shao, J.5
  • 208
    • 85042774844 scopus 로고    scopus 로고
    • Exploiting social network to enhance human-to-human infection analysis without privacy leakage
    • to be published
    • K. Zhang, X. Liang, J. Ni, K. Yang, and X. Shen, "Exploiting social network to enhance human-to-human infection analysis without privacy leakage, " IEEE Trans. Depend. Secure Comput., to be published.
    • IEEE Trans. Depend. Secure Comput
    • Zhang, K.1    Liang, X.2    Ni, J.3    Yang, K.4    Shen, X.5
  • 209
    • 85016064811 scopus 로고    scopus 로고
    • Hybrid privacy-preserving clinical decision support system in fog - Cloud computing
    • Jan
    • X. Liu, R. H. Deng, Y. Yang, H. N. Tran, and S. Zhong, "Hybrid privacy-preserving clinical decision support system in fog - Cloud computing, " Future Gener. Comput. Syst., vol. 78, pp. 825-837, Jan. 2018.
    • (2018) Future Gener. Comput. Syst , vol.78 , pp. 825-837
    • Liu, X.1    Deng, R.H.2    Yang, Y.3    Tran, H.N.4    Zhong, S.5
  • 210
    • 84995527907 scopus 로고    scopus 로고
    • Deep learning with differential privacy
    • Vienna, Austria
    • M. Abadi et al., "Deep learning with differential privacy, " in Proc. ACM CCS, Vienna, Austria, 2016, pp. 308-318.
    • (2016) Proc. ACM CCS , pp. 308-318
    • Abadi, M.1
  • 211
    • 85020567479 scopus 로고    scopus 로고
    • Dynamic differential privacy for ADMM-based distributed classification learning
    • Jan
    • T. Zhang and Q. Zhu, "Dynamic differential privacy for ADMM-based distributed classification learning, " IEEE Trans. Inf. Forensics Security, vol. 12, no. 1, pp. 172-187, Jan. 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.1 , pp. 172-187
    • Zhang, T.1    Zhu, Q.2
  • 212
    • 84910685712 scopus 로고    scopus 로고
    • RAPPOR: Randomized aggregatable privacy-preserving ordinal response
    • Scottsdale, AZ, USA
    • Ú. Erlingsson, V. Pihur, and A. Korolova, "RAPPOR: Randomized aggregatable privacy-preserving ordinal response, " in Proc. ACM CCS, Scottsdale, AZ, USA, 2014, pp. 1054-1067.
    • (2014) Proc. ACM CCS , pp. 1054-1067
    • Erlingsson, U.1    Pihur, V.2    Korolova, A.3
  • 213
    • 84995468307 scopus 로고    scopus 로고
    • Heavy hitter estimation over set-valued data with local differential privacy
    • Vienna, Austria
    • Z. Qin et al., "Heavy hitter estimation over set-valued data with local differential privacy, " in Proc. ACM CCS, Vienna, Austria, 2016, pp. 192-203.
    • (2016) Proc. ACM CCS , pp. 192-203
    • Qin, Z.1
  • 214
    • 84928596525 scopus 로고    scopus 로고
    • An overview of fog computing and its security issues
    • I. Stojmenovic, S. Wen, X. Huang, and H. Luan, "An overview of fog computing and its security issues, " Concurrency Comput. Pract. Exp., vol. 28, no. 10, pp. 2991-3005, 2016.
    • (2016) Concurrency Comput. Pract. Exp , vol.28 , Issue.10 , pp. 2991-3005
    • Stojmenovic, I.1    Wen, S.2    Huang, X.3    Luan, H.4
  • 215
    • 77953213147 scopus 로고    scopus 로고
    • Myths and fallacies of 'personally identifiable information'
    • A. Narayanan and V. Shmatikov, "Myths and fallacies of 'personally identifiable information, "' Commun. ACM, vol. 53, no. 6, pp. 24-26, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.6 , pp. 24-26
    • Narayanan, A.1    Shmatikov, V.2
  • 216
    • 84945176880 scopus 로고    scopus 로고
    • SoK: Research perspectives and challenges for bitcoin and cryptocurrencies
    • San Jose, CA, USA
    • J. Bonneau et al., "SoK: Research perspectives and challenges for bitcoin and cryptocurrencies, " in Proc. IEEE S P, San Jose, CA, USA, 2015, pp. 104-121.
    • (2015) Proc. IEEE S P , pp. 104-121
    • Bonneau, J.1
  • 217
    • 84875784661 scopus 로고    scopus 로고
    • A comparative survey on symmetric key encryption techniques
    • M. Agrawal and P. Mishra, "A comparative survey on symmetric key encryption techniques, " Int. J. Comput. Sci. Eng., vol. 4, no. 5, pp. 877-882, 2012.
    • (2012) Int. J. Comput. Sci. Eng , vol.4 , Issue.5 , pp. 877-882
    • Agrawal, M.1    Mishra, P.2
  • 218
    • 0009010310 scopus 로고
    • A survey of encryption standards
    • Dec
    • B. Kaliski, "A survey of encryption standards, " IEEE Micro, vol. 13, no. 6, pp. 74-81, Dec. 1993.
    • (1993) IEEE Micro , vol.13 , Issue.6 , pp. 74-81
    • Kaliski, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.