Secure crowd-sensing protocol for fog-based vehicular cloud
暂无分享,去创建一个
Anand Nayyar | Atif Alamri | Lewis Nkenyereye | S. M. Riazul Islam | Mohammad Abdullah-Al-Wadud | Muhammad Bilal | M. Bilal | L. Nkenyereye | A. Nayyar | M. Abdullah-Al-Wadud | Atif Alamri | S. Islam
[1] Susana Sargento,et al. Assessing the reliability of fog computing for smart mobility applications in VANETs , 2019, Future Gener. Comput. Syst..
[2] Fan Yang,et al. Efficient data request answering in vehicular Ad-hoc networks based on fog nodes and filters , 2019, Future Gener. Comput. Syst..
[3] Satyajayant Misra,et al. AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge , 2019, IEEE Transactions on Dependable and Secure Computing.
[4] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[5] MengChu Zhou,et al. Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..
[6] Dijiang Huang,et al. Attribute-based Access Control for ICN Naming Scheme , 2018, IEEE Trans. Dependable Secur. Comput..
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Xiaolin Chang,et al. Reliable and Secure Vehicular Fog Service Provision , 2019, IEEE Internet of Things Journal.
[9] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[10] N. Arunkumar,et al. Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..
[11] Donghyun Kim,et al. Secure and Privacy-Aware Incentives-Based Witness Service in Social Internet of Vehicles Clouds , 2018, IEEE Internet of Things Journal.
[12] Sitalakshmi Venkatraman,et al. Use of Data Visualisation for Zero-Day Malware Detection , 2018, Secur. Commun. Networks.
[13] H. Vincent Poor,et al. Mobile Crowdsensing Games in Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.
[14] Sudip Misra,et al. Theoretical modelling of fog computing: a green computing paradigm to support IoT applications , 2016, IET Networks.
[15] Athanasios V. Vasilakos,et al. Design of secure key management and user authentication scheme for fog computing services , 2019, Future Gener. Comput. Syst..
[16] Kang Kai,et al. Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues , 2016 .
[17] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[18] Jiguo Li,et al. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.
[19] Mamoun Alazab,et al. Intelligent mobile malware detection using permission requests and API calls , 2020, Future Gener. Comput. Syst..
[20] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[21] Rong Yu,et al. Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.
[22] Yixian Yang,et al. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.
[23] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[24] Heekuck Oh,et al. Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks , 2014, J. Inf. Process. Syst..
[25] Baowen Xu,et al. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Information Forensics and Security.
[26] Muhammad Bilal,et al. Time Aware Least Recent Used (TLRU) cache management policy in ICN , 2014, 16th International Conference on Advanced Communication Technology.
[27] Senlin Luo,et al. Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges , 2020, IEEE Communications Surveys & Tutorials.
[28] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[29] Stephan Olariu,et al. Taking VANET to the clouds , 2011, Int. J. Pervasive Comput. Commun..
[30] Mohsen Guizani,et al. A blockchain-based architecture for secure vehicular Named Data Networks , 2020, Comput. Electr. Eng..
[31] Thiago H. Silva,et al. Towards scalable mobile crowdsensing through device-to-device communication , 2018, J. Netw. Comput. Appl..
[32] Bayu Adhi Tama,et al. A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[33] Young-Sik Jeong,et al. s-ITSF: a service based intelligent transportation system framework for smart accident management , 2015, Human-centric Computing and Information Sciences.
[34] Chi Harold Liu,et al. Towards secure and privacy preserving collision avoidance system in 5G fog based Internet of Vehicles , 2019, Future Gener. Comput. Syst..
[35] Yuanqing Xia,et al. Incentive mechanism in platform-centric mobile crowdsensing: A one-to-many bargaining approach , 2018, Comput. Networks.
[36] Jiguo Li,et al. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage , 2017, IEEE Transactions on Services Computing.
[37] Mohsen Guizani,et al. Security and privacy preservation in fog-based crowd sensing on the internet of vehicles , 2019, J. Netw. Comput. Appl..
[38] Syh-Yuan Tan. Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things” , 2018, IEEE Access.
[39] Stephan Olariu,et al. Towards autonomous vehicular clouds , 2011, EAI Endorsed Trans. Mob. Commun. Appl..
[40] S. Razak,et al. A survey on Vehicular Ad Hoc Networks routing protocols , 2009 .
[41] Yuguang Fang,et al. Optimal Task Recommendation for Mobile Crowdsourcing With Privacy Control , 2016, IEEE Internet of Things Journal.
[42] Jian Shen,et al. User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage , 2018, IEEE Systems Journal.
[43] Qi Li,et al. Capability-Based Security Enforcement in Named Data Networking , 2017, IEEE/ACM Transactions on Networking.
[44] Md. Rafiqul Islam,et al. A Hybrid Wrapper-Filter Approach for Malware Detection , 1969, J. Networks.
[45] David Pointcheval,et al. Dynamic Threshold Public-Key Encryption , 2008, CRYPTO.
[46] Sangheon Pack,et al. Secure Distribution of Protected Content in Information-Centric Networking , 2019, IEEE Systems Journal.
[47] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[48] Yuguang Fang,et al. Smart Cities on Wheels: A Newly Emerging Vehicular Cognitive Capability Harvesting Network for Data Transportation , 2018, IEEE Wireless Communications.
[49] Frédéric Le Mouël,et al. Efficient Vehicular Crowdsourcing Models in VANET for Disaster Management , 2020, 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring).
[50] Muhammad Bilal,et al. A Cache Management Scheme for Efficient Content Eviction and Replication in Cache Networks , 2017, IEEE Access.
[51] Mamoun Alazab,et al. Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies , 2019, IEEE Transactions on Big Data.
[52] Mario Gerla,et al. Vehicular cloud networking: architecture and design principles , 2014, IEEE Communications Magazine.
[53] Abderrahmane Lakas,et al. Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[54] Silvia Giordano,et al. The Next Paradigm Shift: From Vehicular Networks to Vehicular Clouds , 2013 .
[55] M. Shamim Hossain,et al. Cloudlet-Based Intelligent Auctioning Agents for Truthful Autonomous Electric Vehicles Energy Crowdsourcing , 2020, IEEE Transactions on Vehicular Technology.
[56] Aiqing Zhang,et al. Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.
[57] Muhammad Bilal,et al. Network-Coding Approach for Information-Centric Networking , 2018, IEEE Systems Journal.
[58] Nadjib Badache,et al. Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..
[59] Fuchun Guo,et al. Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes , 2016, International Journal of Information Security.
[60] Amir Qayyum,et al. VANET Architectures and Protocol Stacks: A Survey , 2011, Nets4Cars/Nets4Trains.
[61] Yifei Zhang,et al. Data driven business rule generation based on fog computing , 2018, Future Gener. Comput. Syst..