Secure, efficient and revocable data sharing scheme for vehicular fogs
暂无分享,去创建一个
Xin Wang | Kai Fan | Hui Li | Yintang Yang | Junxiong Wang | Hui Li | K. Fan | Junxiong Wang | Yintang Yang | Xin Wang
[1] Abhay Bansal,et al. Exploring challenges in Mobile cloud computing: An overview , 2013 .
[2] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[3] Ivan Stojmenovic,et al. DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] David Lillethun,et al. Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.
[5] Mario Gerla,et al. Vehicular networks and the future of the mobile internet , 2011, Comput. Networks.
[6] Jin Li,et al. New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation , 2013, ICT-EurAsia.
[7] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[8] Brent Waters,et al. Full-Domain Subgroup Hiding and Constant-Size Group Signatures , 2007, Public Key Cryptography.
[9] Jizhong Zhao,et al. Footprint: Detecting Sybil Attacks in Urban Vehicular Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] Jianhua Li,et al. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks , 2015, Sensors.
[11] Mianxiong Dong,et al. CAMF: Context-Aware Message Forwarding in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[12] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[13] Takayuki Nishio,et al. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud , 2013, MobileCloud '13.
[14] Tao Wang,et al. QoE-ensured price competition model for emerging mobile networks , 2015, IEEE Wireless Communications.
[15] Mianxiong Dong,et al. MMCD: Cooperative Downloading for Highway VANETs , 2015, IEEE Transactions on Emerging Topics in Computing.
[16] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[17] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[18] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[19] Kurt Rothermel,et al. MigCEP: operator migration for mobility driven distributed complex event processing , 2013, DEBS.
[20] Ian Miers,et al. Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.
[21] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[22] Wei Zhang,et al. RUPS: Fixing Relative Distances among Urban Vehicles with Context-Aware Trajectories , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).
[23] Xuemin Shen,et al. Integrity-oriented content transmission in highway vehicular ad hoc networks , 2013, 2013 Proceedings IEEE INFOCOM.
[24] Sagar Naik,et al. Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks , 2011, 2011 Proceedings IEEE INFOCOM.
[25] Eui-nam Huh,et al. Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[26] Eui-nam Huh,et al. E-HAMC: Leveraging Fog computing for emergency alert service , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[27] Long Zheng,et al. A Trade-Off Approach to Optimal Resource Allocation Algorithm with Cache Technology in Ubiquitous Computing Environment , 2009, 2009 International Conference on Computational Science and Engineering.
[28] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..