A Secure Data Access Control Scheme Without Bilinear Pairing in Edge Computing
暂无分享,去创建一个
Junhua Wu | Sheng Xiaofei | Guangshun Li | Lin Qingyan | Yao Yonghui | Guangshun Li | Junhua Wu | Qingyan Lin | Yonghui Yao | Xiaofei Sheng
[1] Shuzhen Xu,et al. Resource Scheduling Based on Improved Spectral Clustering Algorithm in Edge Computing , 2018, Sci. Program..
[2] Duncan S. Wong,et al. Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Zhipeng Cai,et al. Task Scheduling in Deadline-Aware Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.
[4] T. Tuuva,et al. Measurement of the inclusive tt¯$$ \mathrm{t}\overline{\mathrm{t}} $$ cross section in pp collisions at s=5.02$$ \sqrt{s}=5.02 $$ TeV using final states with at least one charged lepton , 2017 .
[5] David Hutchison,et al. The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.
[6] Hokeun Kim,et al. Authentication and Authorization for the Internet of Things , 2017, IT Professional.
[7] Yixian Yang,et al. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.
[8] Siu Loon Hoe,et al. Defining a smart nation: the case of Singapore , 2016, J. Inf. Commun. Ethics Soc..
[9] Donghyun Kim,et al. On security and privacy issues of fog computing supported Internet of Things environment , 2015, 2015 6th International Conference on the Network of the Future (NOF).
[10] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[11] Jiguo Li,et al. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.
[12] Zhipeng Cai,et al. A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.
[13] Fagen Li,et al. Certificateless hybrid signcryption , 2013, Math. Comput. Model..
[14] Benjamin Philip Nachman,et al. Bisection-based asymmetric MT2 computation: a higher precision calculator than existing symmetric methods , 2014, Journal of High Energy Physics.
[15] Keke Gai,et al. Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers , 2018, IEEE Transactions on Industrial Informatics.
[16] Jian Shen,et al. Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..
[17] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[18] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[19] Ying-Hao Hung,et al. Efficient Anonymous Multireceiver Certificateless Encryption , 2017, IEEE Systems Journal.
[20] Muhammad Khurram Khan,et al. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing , 2015, Secur. Commun. Networks.
[21] Da Li,et al. Certificateless Signature Scheme without Random Oracles , 2009, ISA.
[22] Awais Ahmad,et al. IoT-Based Big Data: From Smart City towards Next Generation Super City Planning , 2017, Int. J. Semantic Web Inf. Syst..
[23] Junhua Wu,et al. Methods of Resource Scheduling Based on Optimized Fuzzy Clustering in Fog Computing , 2019, Sensors.
[24] Xianghan Zheng,et al. Lightweight distributed secure data management system for health internet of things , 2017, J. Netw. Comput. Appl..
[25] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[26] C. Pandu Rangan,et al. Efficient and Provably Secure Certificateless Multi-receiver Signcryption , 2008, ProvSec.