Hierarchical Trust Level Evaluation for Pervasive Social Networking
暂无分享,去创建一个
Jian Shen | Tianqi Zhou | Chin-Feng Lai | Jiguo Li | Xiong Li | Xiong Li | Jian Shen | Tianqi Zhou | Chin-Feng Lai | Jiguo Li
[1] Yang Lu,et al. A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model , 2016, Inf. Sci..
[2] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[3] Guanling Chen,et al. Analyzing Privacy Designs of Mobile Social Networking Applications , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[4] Pietro Liò,et al. Social Networking for Pervasive Adaptation , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[5] Cheng-Chi Lee,et al. A Chaotic Maps Based Key Agreement and User Anonymity Protocol without Using Smart Cards and Symmetric Key En/Decryptions , 2015 .
[6] Jin Li,et al. Identity-based chameleon hashing and signatures without key exposure , 2014, Inf. Sci..
[7] Gene Tsudik,et al. New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.
[8] Jian Shen,et al. An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .
[9] Yue Shen,et al. A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..
[10] M. Macy,et al. The evolution of trust and cooperation between strangers: A computational model. , 1998 .
[11] Debiao He,et al. One-to-many authentication for access control in mobile pay-TV systems , 2016, Science China Information Sciences.
[12] Jian Shen,et al. Performance Comparison of Typical Routing Protocols in Ad-hoc Networks , 2014, ICS.
[13] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[14] Yue Shen,et al. PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.
[15] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[16] Jianfeng Ma,et al. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy , 2016 .
[17] Valtteri Niemi,et al. Secure pervasive social networking based on multi-dimensional trust levels , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[18] Richard Han,et al. Solutions to Security and Privacy Issues in Mobile Social Networking , 2009, 2009 International Conference on Computational Science and Engineering.
[19] Gustavo Alonso,et al. Enabling social networking in ad hoc networks of mobile phones , 2009, Proc. VLDB Endow..
[20] Donghai Guan,et al. Trust Management for Ubiquitous Healthcare , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[21] Qian Wang,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.
[22] Peter Herrmann,et al. Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway , 2008, IFIPTM.
[23] Jin Wang,et al. An Efficient Verifiably Encrypted Signature from Weil Pairing , 2013 .
[24] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[25] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[26] Jian Shen,et al. An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems , 2016, J. Ambient Intell. Humaniz. Comput..
[27] Max Van Kleek,et al. MyNet: A Platform for Secure P2P Personal and Social Networking Services , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[28] Ilyong Chung,et al. The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design , 2006, Inf. Sci..
[29] Zheng Yan,et al. Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.
[30] Zhiguo Hong,et al. Stochastic Petri Net-based performance evaluation of hybrid traffic for social networks system , 2016, Neurocomputing.
[31] Jian Shen,et al. Identity-based key agreement protocol employing a symmetric balanced incomplete block design , 2012, Journal of Communications and Networks.
[32] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[33] Jian Shen,et al. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks , 2016, J. Netw. Comput. Appl..
[34] Ren-Hung Hwang,et al. An Adaptive Sensor Data Segments Selection Method for Wearable Health Care Services , 2015, Journal of Medical Systems.
[35] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[36] Xiong Li,et al. A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security , 2016, Wireless Personal Communications.
[37] Jian Shen,et al. A secure identity-based dynamic group data sharing scheme for cloud computing , 2017 .
[38] Mirco Musolesi,et al. Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.
[39] Ben Y. Zhao,et al. Preserving privacy in location-based mobile social applications , 2010, HotMobile '10.