Intelligent conditional collaborative private data sharing
暂无分享,去创建一个
Tooska Dargahi | Mauro Conti | Giuseppe Bianchi | Alberto Caponi | M. Conti | G. Bianchi | A. Caponi | T. Dargahi
[1] Peng Ning,et al. Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach , 2017, 2017 IEEE Symposium on Privacy-Aware Computing (PAC).
[2] Donghui Guo,et al. Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage , 2017, IEEE Access.
[3] Javier López,et al. Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation , 2017, J. Netw. Comput. Appl..
[4] Yixian Yang,et al. PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks , 2017, Future Gener. Comput. Syst..
[5] Richeng Jin,et al. On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach , 2017, HotSoS.
[6] Domenico Cotroneo,et al. A Reliable Crisis Information System to Share Data after the Event of a Large-Scale Disaster , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[7] Emiliano De Cristofaro,et al. Efficient Private Statistics with Succinct Sketches , 2015, NDSS.
[8] Lucas Layman,et al. LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[9] Joseph K. Liu,et al. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage , 2015, IEEE Transactions on Information Forensics and Security.
[10] Andrew Nolan,et al. Cybersecurity and Information Sharing: Legal Challenges and Solutions , 2015 .
[11] Emiliano De Cristofaro,et al. Controlled Data Sharing for Collaborative Predictive Blacklisting , 2015, DIMVA.
[12] B. Obama. Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing , 2015 .
[13] Giuseppe Bianchi,et al. Conditional disclosure of encrypted whitelists for DDoS attack mitigation , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[14] George Danezis,et al. Smart meter aggregation via secret-sharing , 2013, SEGS '13.
[15] Elisa Bertino,et al. Privacy Preserving Policy-Based Content Sharing in Public Clouds , 2013, IEEE Transactions on Knowledge and Data Engineering.
[16] Larry A. Dunning,et al. Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.
[17] Giuseppe Bianchi,et al. Enabling conditional cross-domain data sharing via a cryptographic approach , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.
[18] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[19] G. Bianchi,et al. Feasibility of wire-speed hardware-based conditional per-flow encryption for on-the-fly protection of monitored traffic , 2010, 2010 Future Network & Mobile Summit.
[20] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[21] Chris Clifton,et al. Privacy-preserving data integration and sharing , 2004, DMKD '04.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Hugo Krawczyk,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.
[24] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[25] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[26] Adi Shamir,et al. How to share a secret , 1979, CACM.
[27] Joan Daemen,et al. AES - The Advanced Encryption Standard , 2002 .