-
1
-
-
84954179437
-
Parallel transportation management control system and its applications in building smart cities
-
F. H. Zhou, Z. J. Li, S. H. Chen, and G. Xiong, “Parallel transportation management control system and its applications in building smart cities,” IEEE Transactions on Intelligent Transportation Systems, Vol. 17, 2016, pp. 1576-1585.
-
(2016)
IEEE Transactions on Intelligent Transportation Systems
, vol.17
, pp. 1576-1585
-
-
Zhou, F.H.1
Li, Z.J.2
Chen, S.H.3
Xiong, G.4
-
2
-
-
84939146196
-
Data stream visualization framework for smart cities
-
F. J. Villanueva, C. Aguirre, A. Rubio, D. Villa, et al., “Data stream visualization framework for smart cities,” Soft Computing, Vol. 20, 2016, pp. 1671-1681.
-
(2016)
Soft Computing
, vol.20
, pp. 1671-1681
-
-
Villanueva, F.J.1
Aguirre, C.2
Rubio, A.3
Villa, D.4
-
3
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Z. H. Xia, X. H. Wang, X. M. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, 2015, pp. 340-352.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, pp. 340-352
-
-
Xia, Z.H.1
Wang, X.H.2
Sun, X.M.3
Wang, Q.4
-
4
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, Vol. E98-B, 2015, pp. 190-200.
-
(2015)
IEICE Transactions on Communications
, vol.E98-B
, pp. 190-200
-
-
Fu, Z.J.1
Sun, X.M.2
Liu, Q.3
Zhou, L.4
Shu, J.G.5
-
5
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Y. J. Ren, J. Shen, J. Wang, J. Han, and S. Y. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, 2015, pp. 317-323.
-
(2015)
Journal of Internet Technology
, vol.16
, pp. 317-323
-
-
Ren, Y.J.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.Y.5
-
6
-
-
84963856290
-
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
-
Z. Liu, H. Seo, J. Großschädl, and H. Kim, “Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, pp. 1385-1397.
-
(2016)
IEEE Transactions on Information Forensics and Security
, vol.11
, pp. 1385-1397
-
-
Liu, Z.1
Seo, H.2
Großschädl, J.3
Kim, H.4
-
7
-
-
85021181773
-
On emerging family of elliptic curves to secure internet of things: ECC comes of age
-
Z. Liu, X. Y. Huang, Z. Hu, M. K. Khan, H. Seo, and L. Zhou, “On emerging family of elliptic curves to secure internet of things: ECC comes of age,” IEEE Transactions on Dependable and Secure Computing, Vol. 99, 2016, pp. 237-248.
-
(2016)
IEEE Transactions on Dependable and Secure Computing
, vol.99
, pp. 237-248
-
-
Liu, Z.1
Huang, X.Y.2
Hu, Z.3
Khan, M.K.4
Seo, H.5
Zhou, L.6
-
8
-
-
84954105655
-
Traffic assignment using a density-based travel-time function for intelligent transportation systems
-
P. Kachroo and S. Sastry, “Traffic assignment using a density-based travel-time function for intelligent transportation systems,” IEEE Transactions on Intelligent Trans-poration Systems, Vol. 17, 2016, pp. 1438-1447.
-
(2016)
IEEE Transactions on Intelligent Trans-Poration Systems
, vol.17
, pp. 1438-1447
-
-
Kachroo, P.1
Sastry, S.2
-
9
-
-
84908108412
-
A performance evaluation of an efficient traffic congestion detection protocol (ECODE) for intelligent transportation systems
-
M. B. Younes and A. Boukerche, “A performance evaluation of an efficient traffic congestion detection protocol (ECODE) for intelligent transportation systems,” Ad Hoc Networks, Vol. 24, 2015, pp. 317-336.
-
(2015)
Ad Hoc Networks
, vol.24
, pp. 317-336
-
-
Younes, M.B.1
Boukerche, A.2
-
10
-
-
84961379040
-
Privacy-protected communication for location-based services
-
M. Werner, “Privacy-protected communication for location-based services,” Security and Communicaton Networks, Vol. 9, 2016, pp. 130-138.
-
(2016)
Security and Communicaton Networks
, vol.9
, pp. 130-138
-
-
Werner, M.1
-
11
-
-
84961194736
-
Reverse keyword search for spatio-textual top-k queries in location-based Services
-
X. Lin, J. L. Xu, and H. B. Hu, “Reverse keyword search for spatio-textual top-k queries in location-based Services,” IEEE Transactions on Knowledge and Data Engineering, Vol. 27, 2015, pp. 3056-3069.
-
(2015)
IEEE Transactions on Knowledge and Data Engineering
, vol.27
, pp. 3056-3069
-
-
Lin, X.1
Xu, J.L.2
Hu, H.B.3
-
12
-
-
80054886190
-
Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs
-
M. Benisch, P. G. Kelley, N. Sadeh, and L. F. Cranor, “Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs,” Personal and Ubiqui-tious Computing, Vol. 15, 2011, pp. 679-694.
-
(2011)
Personal and Ubiqui-Tious Computing
, vol.15
, pp. 679-694
-
-
Benisch, M.1
Kelley, P.G.2
Sadeh, N.3
Cranor, L.F.4
-
13
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
T. H. Ma, J. J. Zhou, M. L. Tang, Y. Tian, A. Al-Dhelaan, M. Al-Rodhaan, and S. Lee, “Social network and tag sources based augmenting collaborative recommender system,” IEICE Transactions on Information and Systems, Vol. E98-D, 2015, pp. 902-910.
-
(2015)
IEICE Transactions on Information and Systems
, vol.E98-D
, pp. 902-910
-
-
Ma, T.H.1
Zhou, J.J.2
Tang, M.L.3
Tian, Y.4
Al-Dhelaan, A.5
Al-Rodhaan, M.6
Lee, S.7
-
14
-
-
84875260168
-
Mobile social networking applications
-
N. Jabeur, S. Zeadally, and B. Sayed, “Mobile social networking applications,” Communications of ACM, Vol. 56, 2013, pp. 71-79.
-
(2013)
Communications of ACM
, vol.56
, pp. 71-79
-
-
Jabeur, N.1
Zeadally, S.2
Sayed, B.3
-
15
-
-
84880097902
-
Human tracking and identification using a sensitive floor and wearable accelerometers
-
M. Sousa, A. Techmer, and A. Steinhage, “Human tracking and identification using a sensitive floor and wearable accelerometers,” in Proceedings of IEEE International Conference on Pervasive Computing and Communications, 2013, pp. 166-171.
-
(2013)
Proceedings of IEEE International Conference on Pervasive Computing and Communications
, pp. 166-171
-
-
Sousa, M.1
Techmer, A.2
Steinhage, A.3
-
17
-
-
77951602707
-
Private queries and trajectory anonymization: A dual perspective on location privacy
-
G. Ghinita, “Private queries and trajectory anonymization: A dual perspective on location privacy,” Transactions on Data Privacy, Vol. 2, 2009, pp. 3-19.
-
(2009)
Transactions on Data Privacy
, vol.2
, pp. 3-19
-
-
Ghinita, G.1
-
18
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm, “A survey of computational location privacy,” Personal and Ubiquiitous Computing, Vol. 13, 2009, pp. 391-399.
-
(2009)
Personal and Ubiquiitous Computing
, vol.13
, pp. 391-399
-
-
Krumm, J.1
-
19
-
-
81055157269
-
A survey of trajectory privacy preserving techniques
-
Z. Huo and X. F. Meng, “A survey of trajectory privacy preserving techniques,” Chinese Journal of Computers, Vol. 34, 2011, pp. 1820-1830.
-
(2011)
Chinese Journal of Computers
, vol.34
, pp. 1820-1830
-
-
Huo, Z.1
Meng, X.F.2
-
20
-
-
84863294412
-
Privacy protection for users of location-b ased services
-
K. G. Shin, X. E. Ju, and Z. G. Chen, “Privacy protection for users of location-b ased services,” IEEE Wireless Communications, Vol. 19, 2012, pp. 30-39.
-
(2012)
IEEE Wireless Communications
, vol.19
, pp. 30-39
-
-
Shin, K.G.1
Ju, X.E.2
Chen, Z.G.3
-
21
-
-
79957949408
-
Position sharing for location privac y in non-trusted systems
-
F. Durr, P. Skvortsov, and K. Rothermel, “Position sharing for location privac y in non-trusted systems,” in Proceedings of IEEE International Conference on Pervasive Computing and Communications, 2011, pp. 189-196.
-
(2011)
Proceedings of IEEE International Conference on Pervasive Computing and Communications
, pp. 189-196
-
-
Durr, F.1
Skvortsov, P.2
Rothermel, K.3
-
22
-
-
81055157253
-
Coprivacy: A collaborative location priv acy-preserving method without cloaking region
-
Y. Huang, Z. Huo, and X. F. Meng, “Coprivacy: A collaborative location priv acy-preserving method without cloaking region,” Chinese Journal of Computers, Vo l. 10, 2011, pp. 1976-1985.
-
(2011)
Chinese Journal of Computers
, vol.10
, pp. 1976-1985
-
-
Huang, Y.1
Huo, Z.2
Meng, X.F.3
|