A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks
暂无分享,去创建一个
Lin Wu | Liehuang Zhu | Fei Wang | Yongjun Xu | Dan Liu | Longyijia Li
[1] Refik Molva,et al. Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..
[2] Refik Molva,et al. Privacy-Preserving Content-Based Publish/Subscribe Networks , 2009, SEC.
[3] Peter N. Yianilos,et al. Learning String-Edit Distance , 1996, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Guoliang Li,et al. Efficient interactive fuzzy keyword search , 2009, WWW '09.
[5] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[6] Gerrit Bleumer,et al. Random Oracle Model , 2005, Encyclopedia of Cryptography and Security.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Refik Molva,et al. Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[9] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Xiao-Feng Wang,et al. Attribute-Based Encryption Schemes: Attribute-Based Encryption Schemes , 2011 .
[11] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[12] Su Jin,et al. Attribute-Based Encryption Schemes , 2011 .
[13] Liehuang Zhu,et al. Fuzzy keyword search on encrypted cloud storage data with small index , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[14] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[15] Pan Hui,et al. Pocket Switched Networking: Challenges, Feasibility and Implementation Issues , 2005, WAC.
[16] Minho Shin,et al. AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..
[17] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.
[18] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[19] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[20] Bao Li,et al. Random Oracle Model: Random Oracle Model , 2012 .
[21] Alessandro Puiatti,et al. Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network (PROPICMAN) , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.