PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments

[1]  Stuart A. Kurtz On the Random Oracle Hypothesis , 1983, Inf. Control..

[2]  Omar Alonso,et al.  Implementing crowdsourcing-based relevance experimentation: an industrial perspective , 2013, Information Retrieval.

[3]  Sherali Zeadally,et al.  Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions , 2019, IEEE Internet of Things Journal.

[4]  Ming Luo,et al.  An Enhanced Certificateless Signcryption in the Standard Model , 2018, Wirel. Pers. Commun..

[5]  Tuomas Ahola,et al.  A network perspective on idea and innovation crowdsourcing in industrial firms , 2014 .

[6]  Zongmin Cui,et al.  Certificateless Signcryption in the Standard Model , 2017, Wirel. Pers. Commun..

[7]  David Suendermann,et al.  Crowdsourcing for Speech Processing: Applications to Data Collection, Transcription and Assessment , 2013 .

[8]  Elena Simperl,et al.  How to Use Crowdsourcing Effectively: Guidelines and Examples , 2015 .

[9]  Demetrios Zeinalipour-Yazti,et al.  Crowdsourcing with Smartphones , 2012, IEEE Internet Computing.

[10]  Rongxing Lu,et al.  Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption , 2015, Inf. Sci..

[11]  Fernando González-Ladrón-de-Guevara,et al.  Towards an integrated crowdsourcing definition , 2012, J. Inf. Sci..

[12]  Henry Chesbrough,et al.  From Collaborative Community to Competitive Market: The Quest to Build a Crowdsourcing Platform for Social Innovation , 2019, R&D Management.

[13]  Qiaoyan Wen,et al.  An improved semantically-secure identity-based signcryption scheme in the standard model , 2010, Comput. Electr. Eng..

[14]  Md Zakirul Alam Bhuiyan,et al.  Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments , 2018, IEEE Internet of Things Journal.

[15]  Xinyi Huang,et al.  Cryptographic Hierarchical Access Control for Dynamic Structures , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Martin Schreier,et al.  The Value of Crowdsourcing: Can Users Really Compete with Professionals in Generating New Product Ideas? , 2009 .

[17]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[18]  Peng Li,et al.  An Adaptive Dropout Deep Computation Model for Industrial IoT Big Data Learning With Crowdsourcing to Cloud Computing , 2019, IEEE Transactions on Industrial Informatics.

[19]  Ashok Kumar Das,et al.  LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment , 2018, IEEE Communications Magazine.

[20]  Alon Y. Halevy,et al.  Crowdsourcing systems on the World-Wide Web , 2011, Commun. ACM.

[21]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[22]  Yong Yu,et al.  Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.

[23]  Susana Sargento,et al.  Toward a telco cloud environment for service functions , 2015, IEEE Communications Magazine.

[24]  Omar Alonso,et al.  Crowdsourcing for relevance evaluation , 2008, SIGF.

[25]  Fagen Li,et al.  Secure identity-based signcryption in the standard model , 2013, Math. Comput. Model..