A Dual Mode Privacy-Preserving Scheme Enabled Secure and Anonymous for Edge Computing Assisted Internet of Vehicle Networks
暂无分享,去创建一个
[1] Kyung-Ah Shim. A round-optimal three-party ID-based authenticated key agreement protocol , 2012, Inf. Sci..
[2] Yuguang Fang,et al. ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking , 2020, IEEE Transactions on Vehicular Technology.
[3] Christian Bonnet,et al. Vehicles as Connected Resources: Opportunities and Challenges for the Future , 2017, IEEE Vehicular Technology Magazine.
[4] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[5] Kijoon Chae,et al. A Group Authentication Scheme Based on Lagrange Interpolation Polynomial , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
[6] Sherali Zeadally,et al. Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies , 2015, IEEE Wireless Communications.
[7] Peng Xu,et al. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email , 2016, IEEE Transactions on Computers.
[8] Xu Chen,et al. In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning , 2018, IEEE Network.
[9] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[10] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[11] Senlin Luo,et al. Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges , 2020, IEEE Communications Surveys & Tutorials.
[12] Giacomo Verticale,et al. Optimal Content Prefetching in NDN Vehicle-to-Infrastructure Scenario , 2017, IEEE Transactions on Vehicular Technology.
[13] Zainab Hikmat Mahmood,et al. New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing , 2018, 2018 1st Annual International Conference on Information and Sciences (AiCIS).
[14] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.