Emotion-Aware Multimedia Systems Security
暂无分享,去创建一个
M. Shamim Hossain | Min Chen | Yin Zhang | Ahmed Ghoneim | Di Wu | Yongfeng Qian | Min Chen | Yin Zhang | M. S. Hossain | Ahmed Ghoneim | Di Wu | Yongfeng Qian | M. S. Hossain
[1] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[2] Laurence T. Yang,et al. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.
[3] Liang Tong,et al. A hierarchical edge cloud architecture for mobile computing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[4] Wenzhong Li,et al. Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.
[5] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[6] Ashwin Machanavajjhala,et al. PeGaSus: Data-Adaptive Differentially Private Stream Processing , 2017, CCS.
[7] Xiao Ma,et al. EARS: Emotion-aware recommender system based on hybrid information fusion , 2019, Inf. Fusion.
[8] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[9] Madjid Merabti,et al. An access control model for cloud computing , 2014, J. Inf. Secur. Appl..
[10] Teruo Higashino,et al. Edge-centric Computing: Vision and Challenges , 2015, CCRV.
[11] Burak Kantarci,et al. Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.
[12] Xiaohua Jia,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[13] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[14] Jie Yang,et al. Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication , 2017, CCS.
[15] Victor I. Chang,et al. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..
[16] Blase Ur,et al. Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.
[17] Woo-Hwan Kim,et al. Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates , 2017, CCS.
[18] Sabrina De Capitani di Vimercati,et al. Mix&Slice: Efficient Access Revocation in the Cloud , 2016, CCS.
[19] Dinil Mon Divakaran,et al. FACT: A Framework for Authentication in Cloud-Based IP Traceback , 2017, IEEE Transactions on Information Forensics and Security.
[20] Jun Zhou,et al. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System , 2015, IEEE Transactions on Parallel and Distributed Systems.
[21] G Shiva Krishna,et al. Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption , 2017 .
[22] Ghassan O. Karame,et al. Access control for SDN controllers , 2014, HotSDN.
[23] Jing Chen,et al. Towards decentralized IoT security enhancement: A blockchain approach , 2018, Comput. Electr. Eng..
[24] Pierre-Alain Fouque,et al. Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks , 2016, CRYPTO.
[25] M. Shamim Hossain,et al. Emotion-Aware Video QoE Assessment Via Transfer Learning , 2019, IEEE MultiMedia.