Intelligent conditional collaborative private data sharing

[1]  Peng Ning,et al.  Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach , 2017, 2017 IEEE Symposium on Privacy-Aware Computing (PAC).

[2]  Donghui Guo,et al.  Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage , 2017, IEEE Access.

[3]  Javier López,et al.  Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation , 2017, J. Netw. Comput. Appl..

[4]  Yixian Yang,et al.  PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks , 2017, Future Gener. Comput. Syst..

[5]  Richeng Jin,et al.  On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach , 2017, HotSoS.

[6]  Domenico Cotroneo,et al.  A Reliable Crisis Information System to Share Data after the Event of a Large-Scale Disaster , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[7]  Emiliano De Cristofaro,et al.  Efficient Private Statistics with Succinct Sketches , 2015, NDSS.

[8]  Lucas Layman,et al.  LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[9]  Joseph K. Liu,et al.  Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Andrew Nolan,et al.  Cybersecurity and Information Sharing: Legal Challenges and Solutions , 2015 .

[11]  Emiliano De Cristofaro,et al.  Controlled Data Sharing for Collaborative Predictive Blacklisting , 2015, DIMVA.

[12]  B. Obama Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing , 2015 .

[13]  Giuseppe Bianchi,et al.  Conditional disclosure of encrypted whitelists for DDoS attack mitigation , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[14]  George Danezis,et al.  Smart meter aggregation via secret-sharing , 2013, SEGS '13.

[15]  Elisa Bertino,et al.  Privacy Preserving Policy-Based Content Sharing in Public Clouds , 2013, IEEE Transactions on Knowledge and Data Engineering.

[16]  Larry A. Dunning,et al.  Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.

[17]  Giuseppe Bianchi,et al.  Enabling conditional cross-domain data sharing via a cryptographic approach , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.

[18]  Amos Beimel,et al.  Secret-Sharing Schemes: A Survey , 2011, IWCC.

[19]  G. Bianchi,et al.  Feasibility of wire-speed hardware-based conditional per-flow encryption for on-the-fly protection of monitored traffic , 2010, 2010 Future Network & Mobile Summit.

[20]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[21]  Chris Clifton,et al.  Privacy-preserving data integration and sharing , 2004, DMKD '04.

[22]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[23]  Hugo Krawczyk,et al.  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.

[24]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[25]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[26]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[27]  Joan Daemen,et al.  AES - The Advanced Encryption Standard , 2002 .