-
1
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
-
Apr.
-
C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, Apr. 2006.
-
(2006)
IEEE Commun. Mag.
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
Bao, S.-D.3
-
2
-
-
85024374226
-
Evaluation of diabetic retinal screening and factors for ophthalmology referral in a telemedicine network
-
P. D. Jani et al., "Evaluation of diabetic retinal screening and factors for ophthalmology referral in a telemedicine network," JAMA Ophthalmol., vol. 135, no. 7, pp. 706-714, 2017.
-
(2017)
JAMA Ophthalmol.
, vol.135
, Issue.7
, pp. 706-714
-
-
Jani, P.D.1
-
3
-
-
85016637546
-
Preserving source location privacy for energy harvesting WSNs
-
C. Huang, M. Ma, Y. Liu, and A. Liu, "Preserving source location privacy for energy harvesting WSNs," Sensors, vol. 17, no. 4, p. 724, 2017, doi: 10.3390/s17040724.
-
(2017)
Sensors
, vol.17
, Issue.4
, pp. 724
-
-
Huang, C.1
Ma, M.2
Liu, Y.3
Liu, A.4
-
4
-
-
85055731544
-
Privacy preserving security using biometrics in cloud computing
-
S. Kumar, S. K. Singh, A. K. Singh, S. Tiwari, and R. S. Singh, "Privacy preserving security using biometrics in cloud computing," Multimedia Tools Appl., vol. 77, no. 9, pp. 11017-11039, 2018, doi: 10.1007/s11042-017-4966-5.
-
(2018)
Multimedia Tools Appl.
, vol.77
, Issue.9
, pp. 11017-11039
-
-
Kumar, S.1
Singh, S.K.2
Singh, A.K.3
Tiwari, S.4
Singh, R.S.5
-
5
-
-
85028345951
-
Knowledgeaware proactive nodes selection approach for energy management in internet of things
-
to be published
-
X. Liu, S. Zhao, A. Liu, N. Xiong, and A. V. Vasilakos, "Knowledgeaware proactive nodes selection approach for energy management in Internet of Things," Future Gener. Comput. Syst., to be published, doi: 10.1016/j.future.2017.07.022.
-
Future Gener. Comput. Syst.
-
-
Liu, X.1
Zhao, S.2
Liu, A.3
Xiong, N.4
Vasilakos, A.V.5
-
6
-
-
85059047985
-
Context-aware collect data with energy efficient in cyber-physical cloud systems
-
to be published
-
Y. Liu, A. Liu, S. Guo, Z. Li, Y.-J. Choi, and H. Sekiya, "Context-aware collect data with energy efficient in cyber-physical cloud systems," Future Gener. Comput. Syst., to be published, doi: 10.1016/j.future.2017.05.029.
-
Future Gener. Comput. Syst.
-
-
Liu, Y.1
Liu, A.2
Guo, S.3
Li, Z.4
Choi, Y.-J.5
Sekiya, H.6
-
7
-
-
85140804553
-
3D terrain multiobjective deployment optimization of heterogeneous directional sensor networks in security monitoring
-
to be published
-
B. Cao, J. Zhao, Z. Lv, and X. Liu, "3D terrain multiobjective deployment optimization of heterogeneous directional sensor networks in security monitoring," IEEE Trans. Big Data, to be published, doi: 10.1109/TBDATA.2017.2685581.
-
IEEE Trans. Big Data
-
-
Cao, B.1
Zhao, J.2
Lv, Z.3
Liu, X.4
-
8
-
-
85042715495
-
A smart high-speed backbone path construction approach for energy and delay optimization in WSNs
-
A. Liu, M. Huang, M. Zhao, and T. Wang, "A smart high-speed backbone path construction approach for energy and delay optimization in WSNs," IEEE Access, vol. 6, no. 1, pp. 13836-13854, 2018, doi: 10.1109/ACCESS.2018.2809556.
-
(2018)
IEEE Access
, vol.6
, Issue.1
, pp. 13836-13854
-
-
Liu, A.1
Huang, M.2
Zhao, M.3
Wang, T.4
-
9
-
-
85042701249
-
QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks
-
Y. Liu et al., "QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks," IEEE Access, vol. 6, no. 1, pp. 8273-8291, 2018
-
(2018)
IEEE Access
, vol.6
, Issue.1
, pp. 8273-8291
-
-
Liu, Y.1
-
10
-
-
85042787741
-
A security routing scheme using traceback approach for energy harvesting sensor networks
-
J. Tang, A. Liu, J. Zhang, Z. Zeng, N. Xiong, and T. Wang, "A security routing scheme using traceback approach for energy harvesting sensor networks," Sensors, vol. 18, no. 3, p. 751, 2018, doi: 10.3390/s18034751.
-
(2018)
Sensors
, vol.18
, Issue.3
, pp. 751
-
-
Tang, J.1
Liu, A.2
Zhang, J.3
Zeng, Z.4
Xiong, N.5
Wang, T.6
-
11
-
-
85041363368
-
Dynamic compressive wide-band spectrum sensing based on channel energy reconstruction in cognitive internet of things
-
Jun.
-
Z. Li, B. Chang, S. Wang, A. Liu, F. Zeng, and G. Luo, "Dynamic compressive wide-band spectrum sensing based on channel energy reconstruction in cognitive Internet of Things," IEEE Trans. Ind. Informat., vol. 14, no. 6, pp. 2598-2607, Jun. 2018, doi: 10.1109/TII.2018.2797096.
-
(2018)
IEEE Trans. Ind. Informat.
, vol.14
, Issue.6
, pp. 2598-2607
-
-
Li, Z.1
Chang, B.2
Wang, S.3
Liu, A.4
Zeng, F.5
Luo, G.6
-
12
-
-
85081563293
-
ELDC: An artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs
-
to be published
-
A. Mehmood, Z. Lv, J. Lloret, and M. M. Umar, "ELDC: An artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs," IEEE Trans. Emerg. Topics Comput., to be published, doi: 10.1109/TETC.2017.2671847.
-
IEEE Trans. Emerg. Topics Comput.
-
-
Mehmood, A.1
Lv, Z.2
Lloret, J.3
Umar, M.M.4
-
13
-
-
85021074762
-
Distributed multi-representative re-fusion approach for heterogeneous sensing data collection
-
A. Liu, X. Liu, T. Wei, L. T. Yang, S. Rho, and A. Paul, "Distributed multi-representative re-fusion approach for heterogeneous sensing data collection," ACM Trans. Embedded Comput. Syst., vol. 16, no. 3, 2017, Art. no. 73, doi: 10.1145/2974021.
-
(2017)
ACM Trans. Embedded Comput. Syst.
, vol.16
, Issue.3
-
-
Liu, A.1
Liu, X.2
Wei, T.3
Yang, L.T.4
Rho, S.5
Paul, A.6
-
14
-
-
85046685842
-
Construction low complexity and low delay CDS for big data code dissemination
-
Jun.
-
X. Liu, M. Dong, Y. Liu, A. Liu, and N. N. Xiong, "Construction low complexity and low delay CDS for big data code dissemination," Complexity, vol. 2018, Jun. 2018, Art. no. 5429546, doi: 10.1155/2018/5429546.
-
(2018)
Complexity
, vol.2018
-
-
Liu, X.1
Dong, M.2
Liu, Y.3
Liu, A.4
Xiong, N.N.5
-
15
-
-
85037372036
-
Effective query grouping strategy in clouds
-
Nov.
-
Q. Liu, Y. Guo, J. Wu, and G. Wang, "Effective query grouping strategy in clouds," J. Comput. Sci. Technol., vol. 32, no. 6, pp. 1231-1249, Nov. 2017.
-
(2017)
J. Comput. Sci. Technol.
, vol.32
, Issue.6
, pp. 1231-1249
-
-
Liu, Q.1
Guo, Y.2
Wu, J.3
Wang, G.4
-
16
-
-
84921599744
-
Secure data aggregation in wireless sensor networks using homomorphic encryption
-
M. Kumar, S. Verma, and K. Lata, "Secure data aggregation in wireless sensor networks using homomorphic encryption," Int. J. Electron., vol. 102, no. 4, pp. 690-702, 2015.
-
(2015)
Int. J. Electron.
, vol.102
, Issue.4
, pp. 690-702
-
-
Kumar, M.1
Verma, S.2
Lata, K.3
-
17
-
-
84987657487
-
Verifiable computation over large database with incremental updates
-
Oct.
-
X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates," IEEE Trans. Comput., vol. 65, no. 10, pp. 3184-3195, Oct. 2016.
-
(2016)
IEEE Trans. Comput.
, vol.65
, Issue.10
, pp. 3184-3195
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
18
-
-
85019940910
-
Big program code dissemination scheme for emergency software-define wireless sensor networks
-
X. Liu, G. Li, S. Zhang, and A. Liu, "Big program code dissemination scheme for emergency software-define wireless sensor networks," Peer-Peer Netw. Appl., vol. 11, no. 5, pp. 1038-1059, 2018.
-
(2018)
Peer-Peer Netw. Appl.
, vol.11
, Issue.5
, pp. 1038-1059
-
-
Liu, X.1
Li, G.2
Zhang, S.3
Liu, A.4
-
19
-
-
85047223757
-
A low-latency communication scheme for mobile wireless sensor control systems
-
to be published
-
M. Huang, A. Liu, N. N. Xiong, T. Wang, and A. V. Vasilakos, "A low-latency communication scheme for mobile wireless sensor control systems," IEEE Trans. Syst., Man, Cybern. Syst., to be published, doi: 10.1109/TSMC.2018.2833204.
-
IEEE Trans. Syst., Man, Cybern. Syst.
-
-
Huang, M.1
Liu, A.2
Xiong, N.N.3
Wang, T.4
Vasilakos, A.V.5
-
20
-
-
85046692479
-
A cross-layer optimized opportunistic routing scheme for loss-and-delay sensitive WSNs
-
X. Xu et al., "A cross-layer optimized opportunistic routing scheme for loss-and-delay sensitive WSNs," Sensors, vol. 18, no. 5, p. 1422, 2018, doi: 10.3390/s18051422.
-
(2018)
Sensors
, vol.18
, Issue.5
, pp. 1422
-
-
Xu, X.1
-
21
-
-
85021085483
-
Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs
-
A. Liu, X. Liu, Z. Tang, L. T. Yang, and Z. Shao, "Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs," ACM Trans. Embedded Comput. Syst., vol. 16, no. 3, 2017, Art. no. 68, doi: 10.1145/2990500.
-
(2017)
ACM Trans. Embedded Comput. Syst.
, vol.16
, Issue.3
-
-
Liu, A.1
Liu, X.2
Tang, Z.3
Yang, L.T.4
Shao, Z.5
-
22
-
-
85023597111
-
Fast and orthogonal locality preserving projections for dimensionality reduction
-
Oct.
-
R. Wang, F. Nie, R. Hong, X. Chang, X. Yang, and W. Yu, "Fast and orthogonal locality preserving projections for dimensionality reduction," IEEE Trans. Image Process., vol. 26, no. 10, pp. 5019-5030, Oct. 2017.
-
(2017)
IEEE Trans. Image Process
, vol.26
, Issue.10
, pp. 5019-5030
-
-
Wang, R.1
Nie, F.2
Hong, R.3
Chang, X.4
Yang, X.5
Yu, W.6
-
23
-
-
85027683302
-
Dependable structural health monitoring using wireless sensor networks
-
Jul./Aug.
-
M. Z. A. Bhuiyan, G. Wang, J. Wu, J. Cao, X. Liu, and T. Wang, "Dependable structural health monitoring using wireless sensor networks," IEEE Trans. Depend. Sec. Comput., vol. 14, no. 4, pp. 363-376, Jul./Aug. 2017.
-
(2017)
IEEE Trans. Depend. Sec. Comput.
, vol.14
, Issue.4
, pp. 363-376
-
-
Bhuiyan, M.Z.A.1
Wang, G.2
Wu, J.3
Cao, J.4
Liu, X.5
Wang, T.6
-
24
-
-
84952928855
-
Sink location privacy protection under direction attack in wireless sensor networks
-
J. Wang, F. Wang, Z. Cao, F. Lin, and J. Wu, "Sink location privacy protection under direction attack in wireless sensor networks," Wireless Netw., vol. 23, no. 2, pp. 579-591, 2017.
-
(2017)
Wireless Netw.
, vol.23
, Issue.2
, pp. 579-591
-
-
Wang, J.1
Wang, F.2
Cao, Z.3
Lin, F.4
Wu, J.5
-
25
-
-
85020197190
-
Source location privacy in a cluster-based wireless sensor networks against local adversary
-
Apr.
-
I. M. Tanash, F. Yaseen, M. F. Al-Mistarihi, B. Al-Duwairi, and M. Shurman, "Source location privacy in a cluster-based wireless sensor networks against local adversary," in Proc. IEEE Int. Conf. Inf. Commun. Syst., Apr. 2017, pp. 348-351.
-
(2017)
Proc. IEEE Int. Conf. Inf. Commun. Syst.
, pp. 348-351
-
-
Tanash, I.M.1
Yaseen, F.2
Al-Mistarihi, M.F.3
Al-Duwairi, B.4
Shurman, M.5
-
26
-
-
84953790290
-
-
Hoboken, NJ, USA: Wiley
-
L. Lightfoot, Y. Li, and J. Ren, STaR: Design and Quantitative Measurement of Source-Location Privacy for Wireless Sensor Networks. vol. 9. Hoboken, NJ, USA: Wiley, 2016, pp. 220-228.
-
(2016)
STaR: Design and Quantitative Measurement of Source-Location Privacy for Wireless Sensor Networks
, vol.9
, pp. 220-228
-
-
Lightfoot, L.1
Li, Y.2
Ren, J.3
-
27
-
-
84861760602
-
Quantitative measurement and design of sourcelocation privacy schemes for wireless sensor networks
-
Jul.
-
Y. Li, J. Ren, and J. Wu, "Quantitative measurement and design of sourcelocation privacy schemes for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 7, pp. 1302-1311, Jul. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.7
, pp. 1302-1311
-
-
Li, Y.1
Ren, J.2
Wu, J.3
-
28
-
-
84938212949
-
Probabilistic receiver-location privacy protection in wireless sensor networks
-
Nov.
-
R. Rios, J. Cuellar, and J. López, "Probabilistic receiver-location privacy protection in wireless sensor networks," Inf. Sci., vol. 321, pp. 205-223, Nov. 2015.
-
(2015)
Inf. Sci.
, vol.321
, pp. 205-223
-
-
Rios, R.1
Cuellar, J.2
López, J.3
-
29
-
-
84871818304
-
On providing location privacy for mobile sinks in wireless sensor networks
-
E. C.-H. Ngai and I. Rodhe, "On providing location privacy for mobile sinks in wireless sensor networks," Wireless Netw., vol. 19, no. 1, pp. 115-134, 2013.
-
(2013)
Wireless Netw.
, vol.19
, Issue.1
, pp. 115-134
-
-
Ngai, E.C.-H.1
Rodhe, I.2
-
30
-
-
85052431695
-
An efficient privacy-preserving compressive data gathering scheme in WSNs
-
K. Xie et al., "An efficient privacy-preserving compressive data gathering scheme in WSNs," Inf. Sci., vol. 180, no. 2, pp. 702-715, 2016.
-
(2016)
Inf. Sci.
, vol.180
, Issue.2
, pp. 702-715
-
-
Xie, K.1
-
31
-
-
85042117068
-
Trace malicious source to guarantee cyber security for mass monitor critical infrastructure
-
to be published
-
X. Liu, M. Dong, K. Ota, L. T. Yang, and A. Liu, "Trace malicious source to guarantee cyber security for mass monitor critical infrastructure," J. Comput. Syst. Sci., to be published, doi: 10.1016/j.jcss.2016.09.008.
-
J. Comput. Syst. Sci.
-
-
Liu, X.1
Dong, M.2
Ota, K.3
Yang, L.T.4
Liu, A.5
-
32
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
May
-
K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2015.
-
(2015)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
33
-
-
85045510977
-
Edge-based efficient search over encrypted data mobile cloud storage
-
Y. Guo, F. Liu, Z. Cai, N. Xiao, and Z. Zhao, "Edge-based efficient search over encrypted data mobile cloud storage," Sensors, vol. 18, no. 4, p. 1189, 2018, doi: 10.3390/s18041189.
-
(2018)
Sensors
, vol.18
, Issue.4
, pp. 1189
-
-
Guo, Y.1
Liu, F.2
Cai, Z.3
Xiao, N.4
Zhao, Z.5
-
34
-
-
85046654125
-
Enhancing cellular coverage quality by virtual access point and wireless power transfer
-
Apr.
-
J. Gui, L. Hui, and N. Xiong, "Enhancing cellular coverage quality by virtual access point and wireless power transfer," Wireless Commun. Mobile Comput., vol. 2018, Apr. 2018, Art. no. 9218239, doi: 10.1155/2018/9218239.
-
(2018)
Wireless Commun. Mobile Comput.
, vol.2018
-
-
Gui, J.1
Hui, L.2
Xiong, N.3
-
35
-
-
85028920194
-
Secure attribute-based data sharing for resource-limited users in cloud computing
-
Jan.
-
J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure attribute-based data sharing for resource-limited users in cloud computing," Comput. Secur., vol. 72, pp. 1-12, Jan. 2018.
-
(2018)
Comput. Secur.
, vol.72
, pp. 1-12
-
-
Li, J.1
Zhang, Y.2
Chen, X.3
Xiang, Y.4
-
36
-
-
85007442960
-
Multiple watermarking technique for securing online social network contents using back propagation neural network
-
Sep.
-
A. K. Singh, B. Kumar, S. K. Singh, S. P. Ghrera, and A. Mohan, "Multiple watermarking technique for securing online social network contents using back propagation neural network," Future Gener. Comput. Syst., vol. 86, pp. 926-939, Sep. 2018, doi: 10.1016/j.future.2016.11.023.
-
(2018)
Future Gener. Comput. Syst.
, vol.86
, pp. 926-939
-
-
Singh, A.K.1
Kumar, B.2
Singh, S.K.3
Ghrera, S.P.4
Mohan, A.5
-
37
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
May
-
J. Li, Y. K. Li, X. Chen, P. P. C. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.C.4
Lou, W.5
-
38
-
-
85041406587
-
A trust with abstract information verified routing scheme for cyber-physical network
-
X. Liu, N. Xiong, N. Zhang, A. Liu, H. Shen, and C. Huang, "A trust with abstract information verified routing scheme for cyber-physical network," IEEE Access, vol. 6, pp. 3882-3898, 2018.
-
(2018)
IEEE Access
, vol.6
, pp. 3882-3898
-
-
Liu, X.1
Xiong, N.2
Zhang, N.3
Liu, A.4
Shen, H.5
Huang, C.6
-
39
-
-
84973896642
-
Understanding graphbased trust evaluation in online social networks: Methodologies and challenges
-
W. Jiang, G. Wang, M. Z. A. Bhuiyan, and J. Wu, "Understanding graphbased trust evaluation in online social networks: Methodologies and challenges," ACM Comput. Surv., vol. 49, no. 1, 2016, Art. no. 10.
-
(2016)
ACM Comput. Surv.
, vol.49
, Issue.1
-
-
Jiang, W.1
Wang, G.2
Bhuiyan, M.Z.A.3
Wu, J.4
-
40
-
-
85018496108
-
Bi-level semantic representation analysis for multimedia event detection
-
May
-
X. Chang, Z. Ma, Y. Yang, Z. Zeng, and A. G. Hauptmann, "Bi-level semantic representation analysis for multimedia event detection," IEEE Trans. Cybern., vol. 47, no. 5, pp. 1180-1197, May 2017.
-
(2017)
IEEE Trans. Cybern.
, vol.47
, Issue.5
, pp. 1180-1197
-
-
Chang, X.1
Ma, Z.2
Yang, Y.3
Zeng, Z.4
Hauptmann, A.G.5
-
41
-
-
85039919350
-
Integrated collaborative filtering recommendation in social cyber-physical systems
-
J. Xu et al., "Integrated collaborative filtering recommendation in social cyber-physical systems," Int. J. Distrib. Sensor Netw., vol. 13, no. 12, 2017, Art. no. 1550147717749745.
-
(2017)
Int. J. Distrib. Sensor Netw.
, vol.13
, Issue.12
-
-
Xu, J.1
-
42
-
-
85043474272
-
A services routing based caching scheme for cloud assisted CRNs
-
M. Huang et al., "A services routing based caching scheme for cloud assisted CRNs," IEEE Access, vol. 6, no. 1, pp. 15787-15805, 2018.
-
(2018)
IEEE Access
, vol.6
, Issue.1
, pp. 15787-15805
-
-
Huang, M.1
-
43
-
-
85032727303
-
Multi-source cooperative data collection with a mobile sink for the wireless sensor network
-
C. Han and J. Yang, "Multi-source cooperative data collection with a mobile sink for the wireless sensor network," Sensors, vol. 17, no. 11, p. 2493, 2017.
-
(2017)
Sensors
, vol.17
, Issue.11
, pp. 2493
-
-
Han, C.1
Yang, J.2
-
44
-
-
85016498736
-
E-sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems
-
M. Z. A. Bhuiyan, J. Wu, G. Wang, T. Wang, and M. M. Hassan, "e-sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems," ACM Trans. Auton. Adapt. Syst., vol. 12, no. 1, 2017, Art. no. 1.
-
(2017)
ACM Trans. Auton. Adapt. Syst.
, vol.12
, Issue.1
-
-
Bhuiyan, M.Z.A.1
Wu, J.2
Wang, G.3
Wang, T.4
Hassan, M.M.5
-
45
-
-
85045424026
-
Multi working sets alternate covering scheme for continuous partial coverage in WSNs
-
M. Huang, A. Liu, M. Zhao, and T. Wang, "Multi working sets alternate covering scheme for continuous partial coverage in WSNs," Peer-Peer Networking and Applications, pp. 1-15, 2018, doi: 10.1007/s12083-018-0647-z.
-
(2018)
Peer-Peer Networking and Applications
, pp. 1-15
-
-
Huang, M.1
Liu, A.2
Zhao, M.3
Wang, T.4
-
46
-
-
85040682686
-
Fog-based storage technology to fight with cyber threat
-
Jun.
-
T. Wang et al., "Fog-based storage technology to fight with cyber threat," Future Gener. Comput. Syst., vol. 83, pp. 208-218, Jun. 2018.
-
(2018)
Future Gener. Comput. Syst.
, vol.83
, pp. 208-218
-
-
Wang, T.1
-
47
-
-
85017258278
-
A resource allocation model based on double-sided combinational auctions for transparent computing
-
J. Wang, A. Liu, T. Yan, and Z. Zeng, "A resource allocation model based on double-sided combinational auctions for transparent computing," Peer-Peer Netw. Appl., vol. 11, no. 4, pp. 679-696, 2018.
-
(2018)
Peer-Peer Netw. Appl.
, vol.11
, Issue.4
, pp. 679-696
-
-
Wang, J.1
Liu, A.2
Yan, T.3
Zeng, Z.4
-
48
-
-
85046683449
-
Securing display path for security-sensitive applications on mobile devices
-
J. Cui, Y. Zhang, Z. Cai, A. Liu, and Y. Li, "Securing display path for security-sensitive applications on mobile devices," Comput., Mater. Continua, vol. 55, no. 1, pp. 17-35, 2018.
-
(2018)
Comput., Mater. Continua
, vol.55
, Issue.1
, pp. 17-35
-
-
Cui, J.1
Zhang, Y.2
Cai, Z.3
Liu, A.4
Li, Y.5
-
49
-
-
85008884266
-
Achieving reliable and secure services in cloud computing environments
-
Apr.
-
Q. Liu, G. Wang, X. Liu, T. Peng, and J. Wu, "Achieving reliable and secure services in cloud computing environments," Comput. Elect. Eng., vol. 59, pp. 153-164, Apr. 2017.
-
(2017)
Comput. Elect. Eng.
, vol.59
, pp. 153-164
-
-
Liu, Q.1
Wang, G.2
Liu, X.3
Peng, T.4
Wu, J.5
-
50
-
-
85051187206
-
High performance target tracking scheme with low prediction precision requirement in WSNs
-
to be published
-
A. Liu and S. Zhao, "High performance target tracking scheme with low prediction precision requirement in WSNs," Int. J. Ad Hoc Ubiquitous Comput., to be published.
-
Int. J. Ad Hoc Ubiquitous Comput.
-
-
Liu, A.1
Zhao, S.2
-
51
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Feb.
-
J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. Comput., vol. 64, no. 2, pp. 425-437, Feb. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
52
-
-
84988660486
-
A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks
-
A. K. Das, A. K. Sutrala, V. Odelu, and A. Goswami, "A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks," Wireless Pers. Commun., vol. 94, no. 3, pp. 1899-1933, 2016.
-
(2016)
Wireless Pers. Commun.
, vol.94
, Issue.3
, pp. 1899-1933
-
-
Das, A.K.1
Sutrala, A.K.2
Odelu, V.3
Goswami, A.4
|