An IoT data sharing privacy preserving scheme
暂无分享,去创建一个
Xiaojiang Du | Zhihong Tian | Lihua Yin | Yan Sun | Zhe Sun | Zhihong Tian | Xiaojiang Du | Lihua Yin | Zhe Sun | Yan Sun
[1] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[2] Shen Su,et al. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.
[3] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[4] Peter Corcoran,et al. Mobile-Edge Computing and the Internet of Things for Consumers: Extending cloud computing and services to the edge of the network , 2016, IEEE Consumer Electronics Magazine.
[5] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[6] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[7] Changjun Hu,et al. Process Materials Scientific Data for Intelligent Service Using a Dataspace Model , 2016 .
[8] Xiaojiang Du,et al. Self-healing sensor networks with distributed decision making , 2007, Int. J. Sens. Networks.
[9] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[10] Xiaojiang Du,et al. Achieving big data privacy via hybrid cloud , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[11] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[12] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[13] Jiankun Hu,et al. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.
[14] Xiaojiang Du,et al. A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows , 2016, 2016 IEEE International Conference on Communications (ICC).
[15] David Maier,et al. From databases to dataspaces: a new abstraction for information management , 2005, SGMD.
[16] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[17] Haoyu Wang,et al. HealthEdge: Task scheduling for edge computing with health emergency and human behavior consideration in smart homes , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[18] Toshihiko Yamakami. An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Coordination , 2018, 2018 18th International Symposium on Communications and Information Technologies (ISCIT).
[19] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[20] Quan Zhang,et al. Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts , 2018, IEEE Internet of Things Journal.
[21] Mohsen Guizani,et al. Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.
[22] Mohsen Guizani,et al. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[23] Hideki Imai,et al. Dual-Policy Attribute Based Encryption , 2009, ACNS.