Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing
暂无分享,去创建一个
Wenping Ma | Wei Luo | Wenping Ma | Wei Luo
[1] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[2] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[3] Ivan Stojmenovic,et al. Improved Access Control Mechanism in Vehicular Ad Hoc Networks , 2011, ADHOC-NOW.
[4] Stephan Olariu,et al. Taking VANET to the clouds , 2010, Int. J. Pervasive Comput. Commun..
[5] Xiaohua Jia,et al. DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.
[6] Gongjun Yan,et al. Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.
[7] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[8] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[9] Ivan Stojmenovic,et al. DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[10] Sherali Zeadally,et al. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks , 2015, IEEE Wireless Communications.
[11] Mario Gerla,et al. Vehicular Cloud Computing , 2012, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).
[12] Luming Zhang,et al. An efficient message access quality model in vehicular communication networks , 2016, Signal Process..
[13] Maher Ben Jemaa,et al. Vehicular cloud networks: Challenges, architectures, and future directions , 2017, Veh. Commun..
[14] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[15] Mario Gerla,et al. Vehicular cloud networking: architecture and design principles , 2014, IEEE Communications Magazine.
[16] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[17] S. Yousefi,et al. Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[19] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[20] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[21] Yu Wang,et al. Vehicular Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.
[22] Dijiang Huang,et al. ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks , 2009, Ad Hoc Networks.
[23] Dong Kun Noh,et al. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[24] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[25] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[26] Yixian Yang,et al. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing , 2018, Sensors.
[27] Xuelong Li,et al. Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.
[28] Yen-Cheng Chen,et al. ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.
[29] Xiaohua Jia,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[30] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[31] Tsz Hon Yuen,et al. Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles , 2011, ESORICS.
[32] Chai-Keong Toh,et al. Ad Hoc Mobile Wireless Networks , 2002 .