LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoT
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Liehuang Zhu | Chuan Zhang | Chang Xu | Kashif Sharif | M. Guizani | Xiaojiang Du | Liehuang Zhu | K. Sharif | Chang Xu | Chuan Zhang
[1] Feng Li,et al. Outsourceable two-party privacy-preserving biometric authentication , 2014, AsiaCCS.
[2] Dongxiao Liu,et al. Achieving efficient and privacy-preserving truth discovery in crowd sensing systems , 2017, Comput. Secur..
[3] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[4] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[5] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[6] Myung Ho Kim,et al. A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification , 2012, 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing.
[7] Jin Li,et al. Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.
[8] Bo Zhao,et al. Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation , 2014, SIGMOD Conference.
[9] Philip S. Yu,et al. Truth Discovery with Multiple Conflicting Information Providers on the Web , 2008, IEEE Trans. Knowl. Data Eng..
[10] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[12] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[13] Shucheng Yu,et al. Efficient privacy-preserving biometric identification in cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.
[14] Qihui Wu,et al. Cognitive Internet of Things: A New Paradigm Beyond Connection , 2014, IEEE Internet of Things Journal.
[15] Divesh Srivastava,et al. Truth Finding on the Deep Web: Is the Problem Solved? , 2012, Proc. VLDB Endow..
[16] Dimitrios Hatzinakos,et al. Face recognition with enhanced privacy protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[17] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[18] Hisashi Kashima,et al. Preserving worker privacy in crowdsourcing , 2014, Data Mining and Knowledge Discovery.
[19] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[20] Simon Haykin,et al. Smart Home: Cognitive Interactive People-Centric Internet of Things , 2017, IEEE Communications Magazine.
[21] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[22] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[23] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[24] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[25] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[26] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[27] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[28] Mohsen Guizani,et al. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[29] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[30] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[31] Jin Li,et al. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..
[32] Chi Zhang,et al. Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems , 2013, IEEE Journal on Selected Areas in Communications.
[33] Kui Ren,et al. CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud , 2015, ESORICS.
[34] Debiao He,et al. New biometrics-based authentication scheme for multi-server environment in critical systems , 2015, J. Ambient Intell. Humaniz. Comput..
[35] Hsien-Tsung Chang,et al. A Cognitive Adopted Framework for IoT Big-Data Management and Knowledge Discovery Prospective , 2015, Int. J. Distributed Sens. Networks.
[36] Klaus Moessner,et al. Enabling smart cities through a cognitive management framework for the internet of things , 2013, IEEE Communications Magazine.
[37] Tsuyoshi Takagi,et al. Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data , 2014, IEICE Trans. Inf. Syst..
[38] Fucai Zhou,et al. Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures , 2018, J. Netw. Comput. Appl..