SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing
暂无分享,去创建一个
Rui Zhang | Yanchao Zhang | Xiaocong Jin | Jingchao Sun | Jingchao Sun | Yanchao Zhang | Rui Zhang | X. Jin | Xiaocong Jin
[1] Xu Chen,et al. SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] Bo Sheng,et al. How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[3] Cyrus Shahabi,et al. A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing , 2014, Proc. VLDB Endow..
[4] Dong Xuan,et al. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[5] Feng Zhou,et al. Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).
[6] Vaidy S. Sunderam,et al. Spatial Task Assignment for Crowd Sensing with Cloaked Locations , 2014, 2014 IEEE 15th International Conference on Mobile Data Management.
[7] Prashant J. Shenoy,et al. Sherlock: automatically locating objects for humans , 2008, MobiSys '08.
[8] Shigang Chen,et al. Missing-Tag Detection and Energy–Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels , 2014, IEEE/ACM Transactions on Networking.
[9] Yunhao Liu,et al. ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.
[10] S. Rajsbaum. Foundations of Cryptography , 2014 .
[11] Shigang Chen,et al. Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.
[12] Shigang Chen,et al. Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems , 2012, MobiHoc '12.
[13] Xiang-Yang Li,et al. How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[14] Prabal Dutta,et al. AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages , 2010, SenSys '10.
[15] Jiming Chen,et al. On Optimal Information Capture by Energy-Constrained Mobile Sensors , 2010, IEEE Transactions on Vehicular Technology.
[16] John Zic,et al. Secure Multihop Network Programming with Multiple One-Way Key Chains , 2008, IEEE Transactions on Mobile Computing.
[17] Mo Li,et al. P-MTI: Physical-Layer Missing Tag Identification via Compressive Sensing , 2013, IEEE/ACM Transactions on Networking.
[18] Yunhao Liu,et al. Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[19] D. R. Hush,et al. Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[20] Chi Zhang,et al. Secure crowdsourcing-based cooperative pectrum sensing , 2013, 2013 Proceedings IEEE INFOCOM.
[21] H. Chernoff,et al. The Use of Maximum Likelihood Estimates in {\chi^2} Tests for Goodness of Fit , 1954 .
[22] Lei Yang,et al. Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.
[23] Chi Zhang,et al. Secure top-k query processing via untrusted location-based service providers , 2012, 2012 Proceedings IEEE INFOCOM.
[24] Shiping Chen,et al. Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.
[25] Junshan Zhang,et al. Joint sensing task and subband allocation for large-scale spectrum profiling , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[26] Rui Zhang,et al. Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks , 2015, IEEE Transactions on Wireless Communications.
[27] Bo Sheng,et al. Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.
[28] Feng Qian,et al. A close examination of performance and power characteristics of 4G LTE networks , 2012, MobiSys '12.
[29] Rui Zhang,et al. Privacy-preserving spatiotemporal matching , 2013, 2013 Proceedings IEEE INFOCOM.
[30] Jin Zhang,et al. Assigned Tree Slotted Aloha RFID Tag Anti-Collision Protocols , 2013, IEEE Transactions on Wireless Communications.
[31] Chi Zhang,et al. Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers , 2015, IEEE Transactions on Dependable and Secure Computing.
[32] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.
[33] Bo Sheng,et al. Efficient techniques for monitoring missing RFID tags , 2010, IEEE Transactions on Wireless Communications.
[34] Shigang Chen,et al. Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.
[35] Guang Gong,et al. Securing NFC with Elliptic Curve Cryptography - Challenges and Solutions , 2013, Asia Workshop on RFID Security.
[36] Yehuda Lindell,et al. More efficient oblivious transfer and extensions for faster secure computation , 2013, CCS.
[37] Rui Zhang,et al. Fast identification of the missing tags in a large RFID system , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[38] Basel Alomair,et al. Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.
[39] Kai-Yeung Siu,et al. Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.
[40] Wonjun Lee,et al. Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.