Hash‐balanced binary tree–based public auditing in vehicular edge computing and networks
暂无分享,去创建一个
Debiao He | Neeraj Kumar | Wenbo Shi | Mingxi Liu | Kuan Fan | Neeraj Kumar | D. He | Wenbo Shi | Kuan Fan | Mingxi Liu
[1] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[2] Roberto Tamassia,et al. Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..
[3] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[4] Xu Chen,et al. Decentralized Computation Offloading Game for Mobile Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Khaled Ben Letaief,et al. Mobile Edge Computing: Survey and Research Outlook , 2017, ArXiv.
[6] Roy Want,et al. Guest Editors' Introduction: Energy Harvesting and Conservation , 2005, IEEE Pervasive Comput..
[7] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[8] Debiao He,et al. Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.
[9] Albert Y. Zomaya,et al. Computation Offloading for Service Workflow in Mobile Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.
[10] Meikang Qiu,et al. A Scalable and Quick-Response Software Defined Vehicular Network Assisted by Mobile Edge Computing , 2017, IEEE Communications Magazine.
[11] Sherali Zeadally,et al. Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices , 2019, IEEE Systems Journal.
[12] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[13] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[14] Bilin Shao,et al. Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment , 2018, IEEE Access.
[15] R. C. Hansdah,et al. A Survey of Cloud Storage Facilities , 2011, 2011 IEEE World Congress on Services.
[16] Fan Wu,et al. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.
[17] Leonidas J. Guibas,et al. A dichromatic framework for balanced trees , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).
[18] Chin-Chen Chang,et al. Privacy-preserving public auditing for secure data storage in fog-to-cloud computing , 2019, J. Netw. Comput. Appl..
[19] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.
[20] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[21] Albert Y. Zomaya,et al. Remote Data Auditing in Cloud Computing Environments , 2015, ACM Comput. Surv..
[22] Stephen S. Yau,et al. Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.
[23] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[24] Xiong Li,et al. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..
[25] Chun Chen,et al. Privacy-Preserving Universal Authentication Protocol for Wireless Communications , 2011, IEEE Transactions on Wireless Communications.
[26] Rong Yu,et al. Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.
[27] Xiong Li,et al. Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications , 2019, IEEE Internet of Things Journal.
[28] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[29] Chunxiang Xu,et al. Secure and efficient privacy-preserving public auditing scheme for cloud storage , 2014, Comput. Electr. Eng..
[30] F. Richard Yu,et al. Secure Data Sharing for Vehicular Ad-hoc Networks Using Cloud Computing , 2016, ADHOCNETS.
[31] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[32] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[33] Jin Liu,et al. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.
[34] Yihua Zhang,et al. Efficient dynamic provable possession of remote data via balanced update trees , 2013, ASIA CCS '13.
[35] Sherali Zeadally,et al. Vehicular delay-tolerant networks for smart grid data management using mobile edge computing , 2016, IEEE Communications Magazine.
[36] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[37] Gerhard P. Fettweis,et al. The Tactile Internet: Applications and Challenges , 2014, IEEE Vehicular Technology Magazine.
[38] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[39] Baowen Xu,et al. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.