暂无分享,去创建一个
[1] Cheng Huang,et al. TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning , 2017, IEEE Access.
[2] Hong Shen,et al. Privacy-Preserving Tuple Matching in Distributed Databases , 2009, IEEE Transactions on Knowledge and Data Engineering.
[3] Feng Xia,et al. BEEINFO: Interest-Based Forwarding Using Artificial Bee Colony for Socially Aware Networking , 2015, IEEE Transactions on Vehicular Technology.
[4] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[5] Nenghai Yu,et al. AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network , 2019, IEEE Transactions on Information Forensics and Security.
[6] Wei Wang,et al. HeteRank: A general similarity measure in heterogeneous information networks by integrating multi-type relationships , 2018, Inf. Sci..
[7] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[8] Wei Hu,et al. ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks , 2011, Int. J. Netw. Secur..
[9] Jie Wu,et al. Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[10] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[11] Bo Zhao,et al. Conflicts to Harmony: A Framework for Resolving Conflicts in Heterogeneous Data by Truth Discovery , 2016, IEEE Transactions on Knowledge and Data Engineering.
[12] Timothy W. Finin,et al. A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[13] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[14] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[15] Sherali Zeadally,et al. Trust-based security adaptation mechanism for Vehicular Sensor Networks , 2018, Comput. Networks.
[16] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] Xiaojiang Du,et al. Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[20] Peilin Hong,et al. PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications , 2018, IEEE Transactions on Consumer Electronics.
[21] Naima Iltaf,et al. Modeling interaction using trust and recommendation in ubiquitous computing environment , 2012, EURASIP J. Wirel. Commun. Netw..
[22] Chenglin Miao,et al. A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[23] Mohsen Guizani,et al. PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles , 2018, IEEE Internet of Things Journal.
[24] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[25] Mihir Bellare,et al. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.
[26] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[27] Christine Julien,et al. Trust-Based, Privacy-Preserving Context Aggregation and Sharing in Mobile Ubiquitous Computing , 2013, MobiQuitous.
[28] Alicia Nieto-Reyes,et al. Classification of Alzheimer’s Patients through Ubiquitous Computing † , 2017, Sensors.
[29] Hao Hu,et al. REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET , 2017, IEEE Transactions on Vehicular Technology.
[30] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[31] Bo Zhao,et al. Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation , 2014, SIGMOD Conference.
[32] Jianhua Ma,et al. Ubisafe Computing: Vision and Challenges (I) , 2006, ATC.
[33] Nenghai Yu,et al. Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing , 2018, IEEE Network.
[34] Yuxin Peng,et al. Complex activity recognition using time series pattern dictionary learned from ubiquitous sensors , 2016, Inf. Sci..
[35] Rongxing Lu,et al. TPSQ: Trust-based platoon service query via vehicular communications , 2015, Peer-to-Peer Networking and Applications.
[36] SuKyoung Lee,et al. Energy-efficient wireless hospital sensor networking for remote patient monitoring , 2014, Inf. Sci..
[37] Mohsen Guizani,et al. LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoT , 2018, Future Gener. Comput. Syst..
[38] Pin-Han Ho,et al. A Trust Modeling Framework for Message Propagation and Evaluation in VANETs , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.
[39] Giovanni Acampora,et al. A proposal of ubiquitous fuzzy computing for Ambient Intelligence , 2008, Inf. Sci..
[40] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[41] Chin-Feng Lai,et al. Multi-appliance recognition system with hybrid SVM/GMM classifier in ubiquitous smart home , 2013, Inf. Sci..
[42] Chenglin Miao,et al. Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems , 2015, SenSys.
[43] Laurence T. Yang,et al. Security, privacy and trust of user-centric solutions , 2018, Future Gener. Comput. Syst..
[44] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[45] Keke Gai,et al. Controllable and trustworthy blockchain-based cloud data management , 2019, Future Gener. Comput. Syst..
[46] Liehuang Zhu,et al. RTSense: Providing Reliable Trust-Based Crowdsensing Services in CVCC , 2018, IEEE Network.
[47] Anelise Munaretto,et al. GrAnt: Inferring best forwarders from complex networks' dynamics through a greedy Ant Colony Optimization , 2012, Comput. Networks.
[48] Liehuang Zhu,et al. ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks , 2020, IEEE Transactions on Dependable and Secure Computing.