Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice
暂无分享,去创建一个
Yinghui Zhang | Dong Zheng | Jin Li | Yangguang Tian | Ping Li | Jin Li | Yangguang Tian | Yinghui Zhang | Dong Zheng | Ping Li
[1] Jin Li,et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.
[2] Dongxi Liu,et al. An Identity-Based Signcryption on Lattice without Trapdoor , 2019, J. Univers. Comput. Sci..
[3] Xiaodong Lin,et al. MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.
[4] Qi Han,et al. Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks , 2012, NSS.
[5] Tong Li,et al. GMM and CNN Hybrid Method for Short Utterance Speaker Recognition , 2018, IEEE Transactions on Industrial Informatics.
[6] Yinghui Zhang,et al. PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[7] Yinghui Zhang,et al. Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks , 2017, Mob. Inf. Syst..
[8] Jian Shen,et al. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.
[9] Zhenyu Yang,et al. $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid , 2011, IEEE Transactions on Smart Grid.
[10] Ufuk Topcu,et al. Optimal decentralized protocol for electric vehicle charging , 2013 .
[11] H. Li,et al. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.
[12] Xiaohui Liang,et al. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.
[13] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[14] Ruhul Amin,et al. Design of authentication protocol for wireless sensor network-based smart vehicular system , 2017, Veh. Commun..
[15] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[16] Xuemin Shen,et al. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.
[17] Robert H. Deng,et al. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..
[18] Robert H. Deng,et al. TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain , 2018, IEEE Access.
[19] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[20] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.
[21] Jie Wu,et al. Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring , 2016, IEEE Transactions on Industrial Informatics.
[22] Zhaoquan Cai,et al. Towards secure and flexible EHR sharing in mobile health cloud under static assumptions , 2017, Cluster Computing.
[23] Jianfeng Ma,et al. A remotely keyed file encryption scheme under mobile cloud computing , 2018, J. Netw. Comput. Appl..
[24] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[25] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[26] Jin Li,et al. Differentially private Naive Bayes learning over multiple data sources , 2018, Inf. Sci..
[27] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[28] Josep Domingo-Ferrer,et al. TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids , 2015, IEEE Transactions on Information Forensics and Security.
[29] H. Vincent Poor,et al. Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks , 2014, IEEE Wireless Communications Letters.
[30] Anirban Basu,et al. Privacy-friendly secure bidding for smart grid demand-response , 2017, Inf. Sci..
[31] Jian Shen,et al. Secure data uploading scheme for a smart home system , 2018, Inf. Sci..
[32] Brij Bhooshan Gupta,et al. A Practical Public Key Encryption Scheme Based on Learning Parity With Noise , 2018, IEEE Access.
[33] Jie Wu,et al. Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.
[34] Hao Wang,et al. New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.
[35] Jin Li,et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.
[36] Dongqing Xie,et al. Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links , 2018, IEEE Access.
[37] Thanasis Korakis,et al. Network Store: Exploring Slicing in Future 5G Networks , 2015, MobiArch.
[38] Tong Li,et al. A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT , 2018, Secur. Commun. Networks.
[39] Xiao Tan,et al. Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts , 2014, Theor. Comput. Sci..
[40] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[41] Tong Li,et al. Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection , 2018, IEEE Access.
[42] Chunming Tang,et al. Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..
[43] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[44] Sekyung Han,et al. Development of an Optimal Vehicle-to-Grid Aggregator for Frequency Regulation , 2010, IEEE Transactions on Smart Grid.
[45] George K. Karagiannidis,et al. Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.
[46] Souhwan Jung,et al. A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.
[47] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[48] Willett Kempton,et al. Vehicle-to-grid power implementation: From stabilizing the grid to supporting large-scale renewable energy , 2005 .
[49] Kemal Akkaya,et al. Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.
[50] Ximeng Liu,et al. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.
[51] Ismail Güvenç,et al. Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks , 2016, IEEE Internet of Things Journal.
[52] Eiji Okamoto,et al. Key distribution system based on identification information , 1989, IEEE J. Sel. Areas Commun..
[53] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.