Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing
暂无分享,去创建一个
Jiangang Shu | Yinghui Zhang | Dong Zheng | Xiaokun Zheng | Fangyuan Ren | Jiangfan Zhao | Kaixin Deng | Yinghui Zhang | Jiangang Shu | Kaixin Deng | Xiaokun Zheng | Dong Zheng | J. Zhao | Fang Ren
[1] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[2] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[3] Kemal Akkaya,et al. Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.
[4] Yinghui Zhang,et al. Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks , 2017, Mob. Inf. Syst..
[5] Yinghui Zhang,et al. Efficient and privacy-aware attribute-based data sharing in mobile cloud computing , 2017, Journal of Ambient Intelligence and Humanized Computing.
[6] Dongqing Xie,et al. Spectral and Energy Efficiency of Massive MIMO for Hybrid Architectures Based on Phase Shifters , 2018, IEEE Access.
[7] Jie Wu,et al. Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.
[8] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[9] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[10] Jin Li,et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.
[11] Dongqing Xie,et al. DF Relaying Networks With Randomly Distributed Interferers , 2017, IEEE Access.
[12] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[13] Jin Li,et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.
[14] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[15] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[16] Rui Guo,et al. A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience , 2018, Secur. Commun. Networks.
[17] Ivan Stojmenovic,et al. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[18] Mohsen Guizani,et al. A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing , 2019, IEEE Internet of Things Journal.
[19] Hua Wang,et al. Privacy-Preserving Task Recommendation Services for Crowdsourcing , 2021, IEEE Transactions on Services Computing.
[20] Robert H. Deng,et al. Anonymous Privacy-Preserving Task Matching in Crowdsourcing , 2018, IEEE Internet of Things Journal.
[21] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[22] Robert H. Deng,et al. TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain , 2018, IEEE Access.
[23] Rui Guo,et al. Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing , 2018, Comput. Informatics.
[24] Amin Hosseinian-Far,et al. Emerging Trends in Cloud Computing, Big Data, Fog Computing, IoT and Smart Living , 2018 .
[25] Chen Chen,et al. Efficient and secure big data storage system with leakage resilience in cloud computing , 2018, Soft Comput..
[26] Jie Wu,et al. Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring , 2016, IEEE Transactions on Industrial Informatics.
[27] Jian Shen,et al. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.
[28] Fucai Zhou,et al. Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures , 2018, J. Netw. Comput. Appl..
[29] Jianfeng Ma,et al. A remotely keyed file encryption scheme under mobile cloud computing , 2018, J. Netw. Comput. Appl..
[30] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[31] Jian Shen,et al. A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things , 2018, Secur. Commun. Networks.
[32] Arun Kumar Sangaiah,et al. Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT , 2018, IEEE Access.
[33] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[34] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[35] H. Li,et al. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.
[36] Robert H. Deng,et al. Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing , 2018, IEEE Transactions on Services Computing.
[37] Qi Han,et al. Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks , 2012, NSS.
[38] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[39] Mario Nemirovsky,et al. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[40] George K. Karagiannidis,et al. Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.
[41] Jin Li,et al. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing , 2016, Secur. Commun. Networks.
[42] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[43] Yinghui Zhang,et al. Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice , 2018, J. Netw. Comput. Appl..
[44] Xiaolei Dong,et al. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid , 2014, IEEE Systems Journal.
[45] Robert H. Deng,et al. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..
[46] Sherali Zeadally,et al. Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries , 2017, IEEE Transactions on Smart Grid.
[47] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[48] Jin Li,et al. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..
[49] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[50] Jiangang Shu,et al. Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing” , 2019, IEEE Internet of Things Journal.
[51] Wenbin Chen,et al. Lattice-based linearly homomorphic signatures in the standard model , 2016, Theor. Comput. Sci..
[52] Jian Shen,et al. Secure data uploading scheme for a smart home system , 2018, Inf. Sci..