SSE: A Secure Searchable Encryption Scheme for Urban Sensing and Querying
暂无分享,去创建一个
Mi Wen | Jingsheng Lei | Zhongqin Bi | M. Wen | Jingsheng Lei | Zhongqin Bi
[1] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[2] Chau Yuen,et al. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[4] M. Dohler,et al. Security and Privacy in your Smart City , 2011 .
[5] Gerardo Pelosi,et al. Efficient and Private Access to Outsourced Data , 2011, 2011 31st International Conference on Distributed Computing Systems.
[6] Min Chen. Towards smart city: M2M communications with software agent intelligence , 2012, Multimedia Tools and Applications.
[7] Chen Kefei,et al. A Reliable Pairwise Key-Updating Scheme for Sensor Networks , 2007 .
[8] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[9] Yuan He,et al. COSE: A Query-Centric Framework of Collaborative Heterogeneous Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[11] Jong Hwan Park,et al. Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data , 2011, IEEE Transactions on Knowledge and Data Engineering.
[12] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Kefei Chen,et al. A NTRU Based Key Generation and Data Transmission Scheme for Sensor Networks , 2012 .
[14] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[15] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[16] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Yongdae Kim,et al. Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.
[19] Tarlochan S. Sidhu,et al. Opportunities and challenges of wireless communication technologies for smart grid applications , 2010, IEEE PES General Meeting.
[20] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[21] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[22] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[23] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.