Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
暂无分享,去创建一个
[1] Robert H. Deng,et al. Flexible Access Control to JPEG 2000 Image Code-Streams , 2007, IEEE Transactions on Multimedia.
[2] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[3] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[4] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[5] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[6] Mihir Bellare,et al. DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.
[7] Thomas Stütz,et al. A Survey of H.264 AVC/SVC Encryption , 2012, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Bala Srinivasan,et al. Secure sharing and searching for real-time video data in mobile cloud , 2015, IEEE Network.
[9] Cheng-Hsin Hsu,et al. Flexible Broadcasting of Scalable Video Streams to Heterogeneous Mobile Devices , 2011, IEEE Transactions on Mobile Computing.
[10] Cong Wang,et al. Toward Encrypted Cloud Media Center With Secure Deduplication , 2017, IEEE Transactions on Multimedia.
[11] Zhu Han,et al. Social Learning Based Inference for Crowdsensing in Mobile Social Networks , 2018, IEEE Transactions on Mobile Computing.
[12] Chang Wen Chen,et al. Attribute-based multi-dimension scalable access control for social media sharing , 2016, 2016 IEEE International Conference on Multimedia and Expo (ICME).
[13] Zhen Liu,et al. Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.
[14] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[15] Xiaolin Li,et al. Hiding Media Data via Shaders: Enabling Private Sharing in the Clouds , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[16] Richard A. Frost,et al. A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.
[17] Tao Mei,et al. Who Are Your “Real” Friends: Analyzing and Distinguishing Between Offline and Online Friendships From Social Multimedia Data , 2017, IEEE Transactions on Multimedia.
[18] Martín Abadi,et al. Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..
[19] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[20] Bart Preneel,et al. Practical identity-based private sharing for online social networks , 2016, Comput. Commun..
[21] Chang Wen Chen,et al. Scalable Access Control For Privacy-Aware Media Sharing , 2019, IEEE Transactions on Multimedia.
[22] Yixian Yang,et al. Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing , 2018, IEEE Access.
[23] Min Chen,et al. Coping With Emerging Mobile Social Media Applications Through Dynamic Service Function Chaining , 2016, IEEE Transactions on Wireless Communications.
[24] Robert H. Deng,et al. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud , 2019, IEEE Transactions on Big Data.
[25] Robert H. Deng,et al. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.
[26] Tooska Dargahi,et al. On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.
[27] Jianle Chen,et al. Overview of SHVC: Scalable Extensions of the High Efficiency Video Coding Standard , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[28] Xiaohui Liang,et al. Exploiting multimedia services in mobile social networks from security and privacy perspectives , 2014, IEEE Communications Magazine.
[29] Qin Liu,et al. Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.
[30] Adi Shamir,et al. How to share a secret , 1979, CACM.
[31] Zhou Su,et al. Edge Caching for Layered Video Contents in Mobile Social Networks , 2017, IEEE Transactions on Multimedia.
[32] Youngjoo Shin,et al. Decentralized Server-Aided Encryption for Secure Deduplication in Cloud Storage , 2020, IEEE Transactions on Services Computing.
[33] Robert H. Deng,et al. No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption , 2012, Communications and Multimedia Security.
[34] Mihir Bellare,et al. Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.
[35] Zhiyong Xu,et al. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[36] Mauro Conti,et al. Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks , 2014, ESORICS.
[37] Chang Wen Chen,et al. Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).
[38] Robert H. Deng,et al. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks , 2014, Secur. Commun. Networks.
[39] Shipeng Li,et al. An efficient key scheme for layered access control of MPEG-4 FGS video , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[40] Gabriel-Miro Muntean,et al. Mobile Multi-Source High Quality Multimedia Delivery Scheme , 2017, IEEE Transactions on Broadcasting.
[41] Nenghai Yu,et al. CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding , 2017, IEEE Transactions on Computers.
[42] Cong Wang,et al. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center , 2020, IEEE Transactions on Dependable and Secure Computing.
[43] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.