PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Liehuang Zhu | Meng Li | Zijian Zhang | M. Guizani | Xiaojiang Du | Meng Li | Zijian Zhang | Liehuang Zhu
[1] Mohsen Guizani,et al. Big Data Mining of Users’ Energy Consumption Patterns in the Wireless Smart Grid , 2018, IEEE Wireless Communications.
[2] Qiong Huang,et al. Privacy-Preserving Location Sharing Services for Social Networks , 2017, IEEE Transactions on Services Computing.
[3] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[4] Mingwu Zhang,et al. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.
[5] Xiaodong Lin,et al. Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles , 2018, IEEE Transactions on Vehicular Technology.
[6] Pandi Vijayakumar,et al. EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[7] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[9] Arun Kumar Sangaiah,et al. CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks , 2017, Future Gener. Comput. Syst..
[10] Liehuang Zhu,et al. Achieving differential privacy of trajectory data publishing in participatory sensing , 2017, Inf. Sci..
[11] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[12] Ben Y. Zhao,et al. Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.
[13] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[14] Liehuang Zhu,et al. ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks , 2020, IEEE Transactions on Dependable and Secure Computing.
[15] Rajeev Motwani,et al. Link Privacy in Social Networks , 2008, ICDE.
[16] Xiaodong Lin,et al. Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing , 2019, IEEE Internet of Things Journal.
[17] Mohsen Guizani,et al. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[18] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[19] Sangtae Ha,et al. Clarifying Fog Computing and Networking: 10 Questions and Answers , 2017, IEEE Communications Magazine.
[20] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[21] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[22] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[23] Xiaodong Lin,et al. A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.
[24] Chase Qishi Wu,et al. Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[25] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[26] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[27] Elaine Shi,et al. Opaak: using mobile phones to limit anonymous identities online , 2012, MobiSys '12.
[28] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[29] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.