메뉴 건너뛰기




Volumn 6, Issue , 2018, Pages 42886-42903

Privacy-Preserving Protocol for Sink Node Location in Telemedicine Networks

Author keywords

delivery time; safe; security; sink node privacy; Telemedicine networks

Indexed keywords

DATA PRIVACY; ENERGY UTILIZATION; INTERNET PROTOCOLS; NETWORK SECURITY; SENSORS;

EID: 85050389354     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2018.2858274     Document Type: Article
Times cited : (27)

References (52)
  • 1
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • Apr.
    • C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, Apr. 2006.
    • (2006) IEEE Commun. Mag. , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 2
    • 85024374226 scopus 로고    scopus 로고
    • Evaluation of diabetic retinal screening and factors for ophthalmology referral in a telemedicine network
    • P. D. Jani et al., "Evaluation of diabetic retinal screening and factors for ophthalmology referral in a telemedicine network," JAMA Ophthalmol., vol. 135, no. 7, pp. 706-714, 2017.
    • (2017) JAMA Ophthalmol. , vol.135 , Issue.7 , pp. 706-714
    • Jani, P.D.1
  • 3
    • 85016637546 scopus 로고    scopus 로고
    • Preserving source location privacy for energy harvesting WSNs
    • C. Huang, M. Ma, Y. Liu, and A. Liu, "Preserving source location privacy for energy harvesting WSNs," Sensors, vol. 17, no. 4, p. 724, 2017, doi: 10.3390/s17040724.
    • (2017) Sensors , vol.17 , Issue.4 , pp. 724
    • Huang, C.1    Ma, M.2    Liu, Y.3    Liu, A.4
  • 4
    • 85055731544 scopus 로고    scopus 로고
    • Privacy preserving security using biometrics in cloud computing
    • S. Kumar, S. K. Singh, A. K. Singh, S. Tiwari, and R. S. Singh, "Privacy preserving security using biometrics in cloud computing," Multimedia Tools Appl., vol. 77, no. 9, pp. 11017-11039, 2018, doi: 10.1007/s11042-017-4966-5.
    • (2018) Multimedia Tools Appl. , vol.77 , Issue.9 , pp. 11017-11039
    • Kumar, S.1    Singh, S.K.2    Singh, A.K.3    Tiwari, S.4    Singh, R.S.5
  • 5
    • 85028345951 scopus 로고    scopus 로고
    • Knowledgeaware proactive nodes selection approach for energy management in internet of things
    • to be published
    • X. Liu, S. Zhao, A. Liu, N. Xiong, and A. V. Vasilakos, "Knowledgeaware proactive nodes selection approach for energy management in Internet of Things," Future Gener. Comput. Syst., to be published, doi: 10.1016/j.future.2017.07.022.
    • Future Gener. Comput. Syst.
    • Liu, X.1    Zhao, S.2    Liu, A.3    Xiong, N.4    Vasilakos, A.V.5
  • 6
    • 85059047985 scopus 로고    scopus 로고
    • Context-aware collect data with energy efficient in cyber-physical cloud systems
    • to be published
    • Y. Liu, A. Liu, S. Guo, Z. Li, Y.-J. Choi, and H. Sekiya, "Context-aware collect data with energy efficient in cyber-physical cloud systems," Future Gener. Comput. Syst., to be published, doi: 10.1016/j.future.2017.05.029.
    • Future Gener. Comput. Syst.
    • Liu, Y.1    Liu, A.2    Guo, S.3    Li, Z.4    Choi, Y.-J.5    Sekiya, H.6
  • 7
    • 85140804553 scopus 로고    scopus 로고
    • 3D terrain multiobjective deployment optimization of heterogeneous directional sensor networks in security monitoring
    • to be published
    • B. Cao, J. Zhao, Z. Lv, and X. Liu, "3D terrain multiobjective deployment optimization of heterogeneous directional sensor networks in security monitoring," IEEE Trans. Big Data, to be published, doi: 10.1109/TBDATA.2017.2685581.
    • IEEE Trans. Big Data
    • Cao, B.1    Zhao, J.2    Lv, Z.3    Liu, X.4
  • 8
    • 85042715495 scopus 로고    scopus 로고
    • A smart high-speed backbone path construction approach for energy and delay optimization in WSNs
    • A. Liu, M. Huang, M. Zhao, and T. Wang, "A smart high-speed backbone path construction approach for energy and delay optimization in WSNs," IEEE Access, vol. 6, no. 1, pp. 13836-13854, 2018, doi: 10.1109/ACCESS.2018.2809556.
    • (2018) IEEE Access , vol.6 , Issue.1 , pp. 13836-13854
    • Liu, A.1    Huang, M.2    Zhao, M.3    Wang, T.4
  • 9
    • 85042701249 scopus 로고    scopus 로고
    • QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks
    • Y. Liu et al., "QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks," IEEE Access, vol. 6, no. 1, pp. 8273-8291, 2018
    • (2018) IEEE Access , vol.6 , Issue.1 , pp. 8273-8291
    • Liu, Y.1
  • 10
    • 85042787741 scopus 로고    scopus 로고
    • A security routing scheme using traceback approach for energy harvesting sensor networks
    • J. Tang, A. Liu, J. Zhang, Z. Zeng, N. Xiong, and T. Wang, "A security routing scheme using traceback approach for energy harvesting sensor networks," Sensors, vol. 18, no. 3, p. 751, 2018, doi: 10.3390/s18034751.
    • (2018) Sensors , vol.18 , Issue.3 , pp. 751
    • Tang, J.1    Liu, A.2    Zhang, J.3    Zeng, Z.4    Xiong, N.5    Wang, T.6
  • 11
    • 85041363368 scopus 로고    scopus 로고
    • Dynamic compressive wide-band spectrum sensing based on channel energy reconstruction in cognitive internet of things
    • Jun.
    • Z. Li, B. Chang, S. Wang, A. Liu, F. Zeng, and G. Luo, "Dynamic compressive wide-band spectrum sensing based on channel energy reconstruction in cognitive Internet of Things," IEEE Trans. Ind. Informat., vol. 14, no. 6, pp. 2598-2607, Jun. 2018, doi: 10.1109/TII.2018.2797096.
    • (2018) IEEE Trans. Ind. Informat. , vol.14 , Issue.6 , pp. 2598-2607
    • Li, Z.1    Chang, B.2    Wang, S.3    Liu, A.4    Zeng, F.5    Luo, G.6
  • 12
    • 85081563293 scopus 로고    scopus 로고
    • ELDC: An artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs
    • to be published
    • A. Mehmood, Z. Lv, J. Lloret, and M. M. Umar, "ELDC: An artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs," IEEE Trans. Emerg. Topics Comput., to be published, doi: 10.1109/TETC.2017.2671847.
    • IEEE Trans. Emerg. Topics Comput.
    • Mehmood, A.1    Lv, Z.2    Lloret, J.3    Umar, M.M.4
  • 13
    • 85021074762 scopus 로고    scopus 로고
    • Distributed multi-representative re-fusion approach for heterogeneous sensing data collection
    • A. Liu, X. Liu, T. Wei, L. T. Yang, S. Rho, and A. Paul, "Distributed multi-representative re-fusion approach for heterogeneous sensing data collection," ACM Trans. Embedded Comput. Syst., vol. 16, no. 3, 2017, Art. no. 73, doi: 10.1145/2974021.
    • (2017) ACM Trans. Embedded Comput. Syst. , vol.16 , Issue.3
    • Liu, A.1    Liu, X.2    Wei, T.3    Yang, L.T.4    Rho, S.5    Paul, A.6
  • 14
    • 85046685842 scopus 로고    scopus 로고
    • Construction low complexity and low delay CDS for big data code dissemination
    • Jun.
    • X. Liu, M. Dong, Y. Liu, A. Liu, and N. N. Xiong, "Construction low complexity and low delay CDS for big data code dissemination," Complexity, vol. 2018, Jun. 2018, Art. no. 5429546, doi: 10.1155/2018/5429546.
    • (2018) Complexity , vol.2018
    • Liu, X.1    Dong, M.2    Liu, Y.3    Liu, A.4    Xiong, N.N.5
  • 15
    • 85037372036 scopus 로고    scopus 로고
    • Effective query grouping strategy in clouds
    • Nov.
    • Q. Liu, Y. Guo, J. Wu, and G. Wang, "Effective query grouping strategy in clouds," J. Comput. Sci. Technol., vol. 32, no. 6, pp. 1231-1249, Nov. 2017.
    • (2017) J. Comput. Sci. Technol. , vol.32 , Issue.6 , pp. 1231-1249
    • Liu, Q.1    Guo, Y.2    Wu, J.3    Wang, G.4
  • 16
    • 84921599744 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks using homomorphic encryption
    • M. Kumar, S. Verma, and K. Lata, "Secure data aggregation in wireless sensor networks using homomorphic encryption," Int. J. Electron., vol. 102, no. 4, pp. 690-702, 2015.
    • (2015) Int. J. Electron. , vol.102 , Issue.4 , pp. 690-702
    • Kumar, M.1    Verma, S.2    Lata, K.3
  • 17
    • 84987657487 scopus 로고    scopus 로고
    • Verifiable computation over large database with incremental updates
    • Oct.
    • X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, "Verifiable computation over large database with incremental updates," IEEE Trans. Comput., vol. 65, no. 10, pp. 3184-3195, Oct. 2016.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.10 , pp. 3184-3195
    • Chen, X.1    Li, J.2    Weng, J.3    Ma, J.4    Lou, W.5
  • 18
    • 85019940910 scopus 로고    scopus 로고
    • Big program code dissemination scheme for emergency software-define wireless sensor networks
    • X. Liu, G. Li, S. Zhang, and A. Liu, "Big program code dissemination scheme for emergency software-define wireless sensor networks," Peer-Peer Netw. Appl., vol. 11, no. 5, pp. 1038-1059, 2018.
    • (2018) Peer-Peer Netw. Appl. , vol.11 , Issue.5 , pp. 1038-1059
    • Liu, X.1    Li, G.2    Zhang, S.3    Liu, A.4
  • 20
    • 85046692479 scopus 로고    scopus 로고
    • A cross-layer optimized opportunistic routing scheme for loss-and-delay sensitive WSNs
    • X. Xu et al., "A cross-layer optimized opportunistic routing scheme for loss-and-delay sensitive WSNs," Sensors, vol. 18, no. 5, p. 1422, 2018, doi: 10.3390/s18051422.
    • (2018) Sensors , vol.18 , Issue.5 , pp. 1422
    • Xu, X.1
  • 21
    • 85021085483 scopus 로고    scopus 로고
    • Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs
    • A. Liu, X. Liu, Z. Tang, L. T. Yang, and Z. Shao, "Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs," ACM Trans. Embedded Comput. Syst., vol. 16, no. 3, 2017, Art. no. 68, doi: 10.1145/2990500.
    • (2017) ACM Trans. Embedded Comput. Syst. , vol.16 , Issue.3
    • Liu, A.1    Liu, X.2    Tang, Z.3    Yang, L.T.4    Shao, Z.5
  • 22
    • 85023597111 scopus 로고    scopus 로고
    • Fast and orthogonal locality preserving projections for dimensionality reduction
    • Oct.
    • R. Wang, F. Nie, R. Hong, X. Chang, X. Yang, and W. Yu, "Fast and orthogonal locality preserving projections for dimensionality reduction," IEEE Trans. Image Process., vol. 26, no. 10, pp. 5019-5030, Oct. 2017.
    • (2017) IEEE Trans. Image Process , vol.26 , Issue.10 , pp. 5019-5030
    • Wang, R.1    Nie, F.2    Hong, R.3    Chang, X.4    Yang, X.5    Yu, W.6
  • 23
    • 85027683302 scopus 로고    scopus 로고
    • Dependable structural health monitoring using wireless sensor networks
    • Jul./Aug.
    • M. Z. A. Bhuiyan, G. Wang, J. Wu, J. Cao, X. Liu, and T. Wang, "Dependable structural health monitoring using wireless sensor networks," IEEE Trans. Depend. Sec. Comput., vol. 14, no. 4, pp. 363-376, Jul./Aug. 2017.
    • (2017) IEEE Trans. Depend. Sec. Comput. , vol.14 , Issue.4 , pp. 363-376
    • Bhuiyan, M.Z.A.1    Wang, G.2    Wu, J.3    Cao, J.4    Liu, X.5    Wang, T.6
  • 24
    • 84952928855 scopus 로고    scopus 로고
    • Sink location privacy protection under direction attack in wireless sensor networks
    • J. Wang, F. Wang, Z. Cao, F. Lin, and J. Wu, "Sink location privacy protection under direction attack in wireless sensor networks," Wireless Netw., vol. 23, no. 2, pp. 579-591, 2017.
    • (2017) Wireless Netw. , vol.23 , Issue.2 , pp. 579-591
    • Wang, J.1    Wang, F.2    Cao, Z.3    Lin, F.4    Wu, J.5
  • 27
    • 84861760602 scopus 로고    scopus 로고
    • Quantitative measurement and design of sourcelocation privacy schemes for wireless sensor networks
    • Jul.
    • Y. Li, J. Ren, and J. Wu, "Quantitative measurement and design of sourcelocation privacy schemes for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 7, pp. 1302-1311, Jul. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.7 , pp. 1302-1311
    • Li, Y.1    Ren, J.2    Wu, J.3
  • 28
    • 84938212949 scopus 로고    scopus 로고
    • Probabilistic receiver-location privacy protection in wireless sensor networks
    • Nov.
    • R. Rios, J. Cuellar, and J. López, "Probabilistic receiver-location privacy protection in wireless sensor networks," Inf. Sci., vol. 321, pp. 205-223, Nov. 2015.
    • (2015) Inf. Sci. , vol.321 , pp. 205-223
    • Rios, R.1    Cuellar, J.2    López, J.3
  • 29
    • 84871818304 scopus 로고    scopus 로고
    • On providing location privacy for mobile sinks in wireless sensor networks
    • E. C.-H. Ngai and I. Rodhe, "On providing location privacy for mobile sinks in wireless sensor networks," Wireless Netw., vol. 19, no. 1, pp. 115-134, 2013.
    • (2013) Wireless Netw. , vol.19 , Issue.1 , pp. 115-134
    • Ngai, E.C.-H.1    Rodhe, I.2
  • 30
    • 85052431695 scopus 로고    scopus 로고
    • An efficient privacy-preserving compressive data gathering scheme in WSNs
    • K. Xie et al., "An efficient privacy-preserving compressive data gathering scheme in WSNs," Inf. Sci., vol. 180, no. 2, pp. 702-715, 2016.
    • (2016) Inf. Sci. , vol.180 , Issue.2 , pp. 702-715
    • Xie, K.1
  • 31
    • 85042117068 scopus 로고    scopus 로고
    • Trace malicious source to guarantee cyber security for mass monitor critical infrastructure
    • to be published
    • X. Liu, M. Dong, K. Ota, L. T. Yang, and A. Liu, "Trace malicious source to guarantee cyber security for mass monitor critical infrastructure," J. Comput. Syst. Sci., to be published, doi: 10.1016/j.jcss.2016.09.008.
    • J. Comput. Syst. Sci.
    • Liu, X.1    Dong, M.2    Ota, K.3    Yang, L.T.4    Liu, A.5
  • 32
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • May
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware end-to-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, May 2015.
    • (2015) IEEE Trans. Mobile Comput. , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 33
    • 85045510977 scopus 로고    scopus 로고
    • Edge-based efficient search over encrypted data mobile cloud storage
    • Y. Guo, F. Liu, Z. Cai, N. Xiao, and Z. Zhao, "Edge-based efficient search over encrypted data mobile cloud storage," Sensors, vol. 18, no. 4, p. 1189, 2018, doi: 10.3390/s18041189.
    • (2018) Sensors , vol.18 , Issue.4 , pp. 1189
    • Guo, Y.1    Liu, F.2    Cai, Z.3    Xiao, N.4    Zhao, Z.5
  • 34
    • 85046654125 scopus 로고    scopus 로고
    • Enhancing cellular coverage quality by virtual access point and wireless power transfer
    • Apr.
    • J. Gui, L. Hui, and N. Xiong, "Enhancing cellular coverage quality by virtual access point and wireless power transfer," Wireless Commun. Mobile Comput., vol. 2018, Apr. 2018, Art. no. 9218239, doi: 10.1155/2018/9218239.
    • (2018) Wireless Commun. Mobile Comput. , vol.2018
    • Gui, J.1    Hui, L.2    Xiong, N.3
  • 35
    • 85028920194 scopus 로고    scopus 로고
    • Secure attribute-based data sharing for resource-limited users in cloud computing
    • Jan.
    • J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure attribute-based data sharing for resource-limited users in cloud computing," Comput. Secur., vol. 72, pp. 1-12, Jan. 2018.
    • (2018) Comput. Secur. , vol.72 , pp. 1-12
    • Li, J.1    Zhang, Y.2    Chen, X.3    Xiang, Y.4
  • 36
    • 85007442960 scopus 로고    scopus 로고
    • Multiple watermarking technique for securing online social network contents using back propagation neural network
    • Sep.
    • A. K. Singh, B. Kumar, S. K. Singh, S. P. Ghrera, and A. Mohan, "Multiple watermarking technique for securing online social network contents using back propagation neural network," Future Gener. Comput. Syst., vol. 86, pp. 926-939, Sep. 2018, doi: 10.1016/j.future.2016.11.023.
    • (2018) Future Gener. Comput. Syst. , vol.86 , pp. 926-939
    • Singh, A.K.1    Kumar, B.2    Singh, S.K.3    Ghrera, S.P.4    Mohan, A.5
  • 37
    • 84927584035 scopus 로고    scopus 로고
    • A hybrid cloud approach for secure authorized deduplication
    • May
    • J. Li, Y. K. Li, X. Chen, P. P. C. Lee, and W. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.5 , pp. 1206-1216
    • Li, J.1    Li, Y.K.2    Chen, X.3    Lee, P.P.C.4    Lou, W.5
  • 38
    • 85041406587 scopus 로고    scopus 로고
    • A trust with abstract information verified routing scheme for cyber-physical network
    • X. Liu, N. Xiong, N. Zhang, A. Liu, H. Shen, and C. Huang, "A trust with abstract information verified routing scheme for cyber-physical network," IEEE Access, vol. 6, pp. 3882-3898, 2018.
    • (2018) IEEE Access , vol.6 , pp. 3882-3898
    • Liu, X.1    Xiong, N.2    Zhang, N.3    Liu, A.4    Shen, H.5    Huang, C.6
  • 39
    • 84973896642 scopus 로고    scopus 로고
    • Understanding graphbased trust evaluation in online social networks: Methodologies and challenges
    • W. Jiang, G. Wang, M. Z. A. Bhuiyan, and J. Wu, "Understanding graphbased trust evaluation in online social networks: Methodologies and challenges," ACM Comput. Surv., vol. 49, no. 1, 2016, Art. no. 10.
    • (2016) ACM Comput. Surv. , vol.49 , Issue.1
    • Jiang, W.1    Wang, G.2    Bhuiyan, M.Z.A.3    Wu, J.4
  • 40
    • 85018496108 scopus 로고    scopus 로고
    • Bi-level semantic representation analysis for multimedia event detection
    • May
    • X. Chang, Z. Ma, Y. Yang, Z. Zeng, and A. G. Hauptmann, "Bi-level semantic representation analysis for multimedia event detection," IEEE Trans. Cybern., vol. 47, no. 5, pp. 1180-1197, May 2017.
    • (2017) IEEE Trans. Cybern. , vol.47 , Issue.5 , pp. 1180-1197
    • Chang, X.1    Ma, Z.2    Yang, Y.3    Zeng, Z.4    Hauptmann, A.G.5
  • 41
    • 85039919350 scopus 로고    scopus 로고
    • Integrated collaborative filtering recommendation in social cyber-physical systems
    • J. Xu et al., "Integrated collaborative filtering recommendation in social cyber-physical systems," Int. J. Distrib. Sensor Netw., vol. 13, no. 12, 2017, Art. no. 1550147717749745.
    • (2017) Int. J. Distrib. Sensor Netw. , vol.13 , Issue.12
    • Xu, J.1
  • 42
    • 85043474272 scopus 로고    scopus 로고
    • A services routing based caching scheme for cloud assisted CRNs
    • M. Huang et al., "A services routing based caching scheme for cloud assisted CRNs," IEEE Access, vol. 6, no. 1, pp. 15787-15805, 2018.
    • (2018) IEEE Access , vol.6 , Issue.1 , pp. 15787-15805
    • Huang, M.1
  • 43
    • 85032727303 scopus 로고    scopus 로고
    • Multi-source cooperative data collection with a mobile sink for the wireless sensor network
    • C. Han and J. Yang, "Multi-source cooperative data collection with a mobile sink for the wireless sensor network," Sensors, vol. 17, no. 11, p. 2493, 2017.
    • (2017) Sensors , vol.17 , Issue.11 , pp. 2493
    • Han, C.1    Yang, J.2
  • 44
    • 85016498736 scopus 로고    scopus 로고
    • E-sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems
    • M. Z. A. Bhuiyan, J. Wu, G. Wang, T. Wang, and M. M. Hassan, "e-sampling: Event-sensitive autonomous adaptive sensing and low-cost monitoring in networked sensing systems," ACM Trans. Auton. Adapt. Syst., vol. 12, no. 1, 2017, Art. no. 1.
    • (2017) ACM Trans. Auton. Adapt. Syst. , vol.12 , Issue.1
    • Bhuiyan, M.Z.A.1    Wu, J.2    Wang, G.3    Wang, T.4    Hassan, M.M.5
  • 45
    • 85045424026 scopus 로고    scopus 로고
    • Multi working sets alternate covering scheme for continuous partial coverage in WSNs
    • M. Huang, A. Liu, M. Zhao, and T. Wang, "Multi working sets alternate covering scheme for continuous partial coverage in WSNs," Peer-Peer Networking and Applications, pp. 1-15, 2018, doi: 10.1007/s12083-018-0647-z.
    • (2018) Peer-Peer Networking and Applications , pp. 1-15
    • Huang, M.1    Liu, A.2    Zhao, M.3    Wang, T.4
  • 46
    • 85040682686 scopus 로고    scopus 로고
    • Fog-based storage technology to fight with cyber threat
    • Jun.
    • T. Wang et al., "Fog-based storage technology to fight with cyber threat," Future Gener. Comput. Syst., vol. 83, pp. 208-218, Jun. 2018.
    • (2018) Future Gener. Comput. Syst. , vol.83 , pp. 208-218
    • Wang, T.1
  • 47
    • 85017258278 scopus 로고    scopus 로고
    • A resource allocation model based on double-sided combinational auctions for transparent computing
    • J. Wang, A. Liu, T. Yan, and Z. Zeng, "A resource allocation model based on double-sided combinational auctions for transparent computing," Peer-Peer Netw. Appl., vol. 11, no. 4, pp. 679-696, 2018.
    • (2018) Peer-Peer Netw. Appl. , vol.11 , Issue.4 , pp. 679-696
    • Wang, J.1    Liu, A.2    Yan, T.3    Zeng, Z.4
  • 48
    • 85046683449 scopus 로고    scopus 로고
    • Securing display path for security-sensitive applications on mobile devices
    • J. Cui, Y. Zhang, Z. Cai, A. Liu, and Y. Li, "Securing display path for security-sensitive applications on mobile devices," Comput., Mater. Continua, vol. 55, no. 1, pp. 17-35, 2018.
    • (2018) Comput., Mater. Continua , vol.55 , Issue.1 , pp. 17-35
    • Cui, J.1    Zhang, Y.2    Cai, Z.3    Liu, A.4    Li, Y.5
  • 49
    • 85008884266 scopus 로고    scopus 로고
    • Achieving reliable and secure services in cloud computing environments
    • Apr.
    • Q. Liu, G. Wang, X. Liu, T. Peng, and J. Wu, "Achieving reliable and secure services in cloud computing environments," Comput. Elect. Eng., vol. 59, pp. 153-164, Apr. 2017.
    • (2017) Comput. Elect. Eng. , vol.59 , pp. 153-164
    • Liu, Q.1    Wang, G.2    Liu, X.3    Peng, T.4    Wu, J.5
  • 50
    • 85051187206 scopus 로고    scopus 로고
    • High performance target tracking scheme with low prediction precision requirement in WSNs
    • to be published
    • A. Liu and S. Zhao, "High performance target tracking scheme with low prediction precision requirement in WSNs," Int. J. Ad Hoc Ubiquitous Comput., to be published.
    • Int. J. Ad Hoc Ubiquitous Comput.
    • Liu, A.1    Zhao, S.2
  • 51
    • 84921381171 scopus 로고    scopus 로고
    • Identity-based encryption with outsourced revocation in cloud computing
    • Feb.
    • J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. Comput., vol. 64, no. 2, pp. 425-437, Feb. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.2 , pp. 425-437
    • Li, J.1    Li, J.2    Chen, X.3    Jia, C.4    Lou, W.5
  • 52
    • 84988660486 scopus 로고    scopus 로고
    • A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks
    • A. K. Das, A. K. Sutrala, V. Odelu, and A. Goswami, "A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks," Wireless Pers. Commun., vol. 94, no. 3, pp. 1899-1933, 2016.
    • (2016) Wireless Pers. Commun. , vol.94 , Issue.3 , pp. 1899-1933
    • Das, A.K.1    Sutrala, A.K.2    Odelu, V.3    Goswami, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.