-
1
-
-
84925468156
-
The internet of things: A survey
-
S. Li, L. D. Xu, and S. Zhao, “The internet of things: A survey,” Information Systems Frontiers, Vol. 17, 2015, pp. 243-259.
-
(2015)
Information Systems Frontiers
, vol.17
, pp. 243-259
-
-
Li, S.1
Xu, L.D.2
Zhao, S.3
-
2
-
-
84969143086
-
The role of big data in smart city
-
I. A. T. Hashem, V. Chang, N. B. Anuar, K. Adewole, I. Yaqoob, A. Gani, E. Ahmed, and H. Chiroma, “The role of big data in smart city,” International Journal of Information Management, Vol. 36, 2016, pp. 748-758.
-
(2016)
International Journal of Information Management
, vol.36
, pp. 748-758
-
-
Hashem, I.A.T.1
Chang, V.2
Anuar, N.B.3
Adewole, K.4
Yaqoob, I.5
Gani, A.6
Ahmed, E.7
Chiroma, H.8
-
3
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, Vol. 16, 2015, pp. 171-178.
-
(2015)
Journal of Internet Technology
, vol.16
, pp. 171-178
-
-
Shen, J.1
Tan, H.2
Wang, J.3
Wang, J.4
Lee, S.5
-
4
-
-
84986557095
-
Developing a secure cloud storage system for storing IoT data by applying role based encryption
-
J. D. Bokefode, A. S. Bhise, P. A. Satarkar, and D. G. Modani, “Developing a secure cloud storage system for storing IoT data by applying role based encryption,” Pro-cedia Computer Science, Vol. 89, 2016, pp. 43-50.
-
(2016)
Pro-Cedia Computer Science
, vol.89
, pp. 43-50
-
-
Bokefode, J.D.1
Bhise, A.S.2
Satarkar, P.A.3
Modani, D.G.4
-
5
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Z. Fu, K. Ren, J. Shu, X. Sun and F. Huang, “Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2015, pp. 2546-2559.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, pp. 2546-2559
-
-
Fu, Z.1
Ren, K.2
Shu, J.3
Sun, X.4
Huang, F.5
-
6
-
-
84991088919
-
Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement,” IEEE Transactions on Information Forensics and Security, 2016, p. 1.
-
(2016)
IEEE Transactions on Information Forensics and Security
, pp. 1
-
-
Fu, Z.1
Wu, X.2
Guan, C.3
Sun, X.4
Ren, K.5
-
7
-
-
77954695824
-
-
Cloud Security Alliance, “Top threats to cloud computing,” 2010, http://www.cloudsecurityalliance.org.
-
(2010)
Top Threats to Cloud Computing
-
-
-
8
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, “Message-locked encryption and secure deduplication,” in Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2013, pp. 296-312.
-
(2013)
Proceedings of The 32nd Annual International Conference on The Theory and Applications of Cryptographic Techniques
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
9
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of ACM Conference on Computer and Communications Security, 2011, pp. 491-500.
-
(2011)
Proceedings of ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
10
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of ACM Conference on Computer and Communications Security, Vol. 14, 2007, pp. 598-609.
-
(2007)
Proceedings of ACM Conference on Computer and Communications Security
, vol.14
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
11
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, Vol. 22, 2010, pp. 847-859.
-
(2010)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
12
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, 2015, pp. 317-323.
-
(2015)
Journal of Internet Technology
, vol.16
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
14
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
J. Yuan and S. Yu, “Proofs of retrievability with public verifiability and constant communication cost in cloud,” International Workshop on Security in Cloud Computing, 2013, pp. 19-26.
-
(2013)
International Workshop on Security in Cloud Computing
, pp. 19-26
-
-
Yuan, J.1
Yu, S.2
-
15
-
-
84878998883
-
Compact proofs of retrievability
-
H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of Cryptology, Vol. 26, 2013, pp. 442-483.
-
(2013)
Journal of Cryptology
, vol.26
, pp. 442-483
-
-
Shacham, H.1
Waters, B.2
-
18
-
-
84923063247
-
Proofs of ownership and retrievability in cloud storage
-
R. Du, L. Deng, J. Chen, K. He, and M. Zheng, “Proofs of ownership and retrievability in cloud storage,” in Proceedings of IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2014, pp. 328-335.
-
(2014)
Proceedings of IEEE International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 328-335
-
-
Du, R.1
Deng, L.2
Chen, J.3
He, K.4
Zheng, M.5
-
19
-
-
84943782387
-
BL-MLE: Block-level message-locked encryption for secure large file deduplication
-
R. Chen, Y. Mu, G. Yang, and F. Guo, “BL-MLE: Block-level message-locked encryption for secure large file deduplication,” IEEE Transactions on Information Forensics and Security, Vol. 10, 2015, pp. 2643-2652.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, pp. 2643-2652
-
-
Chen, R.1
Mu, Y.2
Yang, G.3
Guo, F.4
-
22
-
-
85049914685
-
Short signatures without random oracles
-
D. Boneh and X. Boyen, “Short signatures without random oracles,” Lecture Notes in Computer Science, Vol. 3352, 2015, pp. 134-148.
-
(2015)
Lecture Notes in Computer Science
, vol.3352
, pp. 134-148
-
-
Boneh, D.1
Boyen, X.2
-
23
-
-
78650828289
-
Constant-size commitments to polynomials and their applications
-
A. Kate, G. M. Zaverucha, and I. Goldberg, “Constant-size commitments to polynomials and their applications,” in Proceedings of International Conference on Theory and Application of Cryptology and Information Security, Vol. 6477, 2010, pp. 177-194.
-
(2010)
Proceedings of International Conference on Theory and Application of Cryptology and Information Security
, vol.6477
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
25
-
-
77952046408
-
Probabilistic public key encryption with equality test
-
G. Yang, C. H. Tan, Q. Huang, and D. S. Wong, “Probabilistic public key encryption with equality test,” in Proceedings of International Conference on Topics in Cryptology, Vol. 5985, 2010, pp. 119-131.
-
(2010)
Proceedings of International Conference on Topics in Cryptology
, vol.5985
, pp. 119-131
-
-
Yang, G.1
Tan, C.H.2
Huang, Q.3
Wong, D.S.4
-
26
-
-
84903641784
-
Leakage resilient proofs of ownership in cloud storage, revisited
-
J. Xu and J. Zhou, “Leakage resilient proofs of ownership in cloud storage, revisited,” Applied Cryptography and Network Security, 2014, pp. 97-115.
-
(2014)
Applied Cryptography and Network Security
, pp. 97-115
-
-
Xu, J.1
Zhou, J.2
-
27
-
-
72449189555
-
Hedged public-key encryption: How to protect against bad randomness
-
M. Bellare, Z. Brakerski, M. Noar, T. Ristenpart, G. Segev, H. Shacham, and S. Yilek, “Hedged public-key encryption: How to protect against bad randomness,” in Proceedings of International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology, Vol. 5912, 2009, pp. 232-249.
-
(2009)
Proceedings of International Conference on Theory and Application of Cryptology and Information Security: Advances in Cryptology
, vol.5912
, pp. 232-249
-
-
Bellare, M.1
Brakerski, Z.2
Noar, M.3
Ristenpart, T.4
Segev, G.5
Shacham, H.6
Yilek, S.7
-
28
-
-
84988425564
-
On emerging family of elliptic curves to secure internet of things: ECC comes of age
-
Z. Liu, X. Huang, Z. Hu, M. K. Khan, H. Seo, and L. Zhou, “On emerging family of elliptic curves to secure internet of things: ECC comes of age,” IEEE Transactions on Dependable and Secure Computing, 2016, pp. 1-12.
-
(2016)
IEEE Transactions on Dependable and Secure Computing
, pp. 1-12
-
-
Liu, Z.1
Huang, X.2
Hu, Z.3
Khan, M.K.4
Seo, H.5
Zhou, L.6
-
29
-
-
84963856290
-
Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
-
Z. Liu, H. Seo, J. Großschädl, and H. Kim, “Efficient implementation of NIST-com-pliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2015, pp. 1385-1397.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.11
, pp. 1385-1397
-
-
Liu, Z.1
Seo, H.2
Großschädl, J.3
Kim, H.4
|