Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system
暂无分享,去创建一个
Jian Xu | Fucai Zhou | Yu Zhang | Wei Wu | Andi Wang | Laiwen Wei | Jian Xu | Yu Zhang | Wei Wu | Fu-cai Zhou | Laiwen Wei | Andi Wang
[1] Shan Gao,et al. Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks , 2015, IEEE Transactions on Mobile Computing.
[2] Mingzhe Jiang,et al. Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..
[3] Chin-Feng Lai,et al. A green cloud-assisted health monitoring service on wireless body area networks , 2014, Inf. Sci..
[4] Hoh Peter In,et al. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..
[5] Athanasios V. Vasilakos,et al. Cloud-assisted Wireless Body Area Networks , 2014, Information Sciences.
[6] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[7] Mark Simkin,et al. VeriStream - A Framework for Verifiable Data Streaming , 2015, Financial Cryptography.
[8] Honggang Wang,et al. Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks , 2013, IEEE Transactions on Emerging Topics in Computing.
[9] Mohammad S. Obaidat,et al. SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[10] Qian Wang,et al. Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.
[11] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[12] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[13] Kyung Sup Kwak,et al. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.
[14] Dongqing Xie,et al. Secure Auditing and Deduplicating Data in Cloud , 2016, IEEE Transactions on Computers.
[15] Bo Sheng,et al. Verifiable Privacy-Preserving Sensor Network Storage for Range Query , 2011, IEEE Transactions on Mobile Computing.
[16] Chun Chen,et al. Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks , 2013, IEEE Journal of Biomedical and Health Informatics.
[17] Delia Ioana Dogaru,et al. Cyber security in healthcare networks , 2017, 2017 E-Health and Bioengineering Conference (EHB).
[18] Alex X. Liu,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Privacy- and Integrity-Preserving Range Queries in Sensor Networks , 2022 .
[19] Mohamed F. Younis,et al. Load-conscious maximization of base-station location privacy in wireless sensor networks , 2017, Comput. Networks.
[20] Chun-Shien Lu,et al. Secure Multidimensional Queries in Tiered Sensor Networks , 2009, ArXiv.
[21] Daojing He,et al. Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks , 2014, IEEE Journal of Biomedical and Health Informatics.
[22] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[23] Rui Li,et al. A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.
[24] Kee Sung Kim,et al. Efficient verifiable data streaming , 2015, Secur. Commun. Networks.
[25] Meikang Qiu,et al. Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.
[26] Pan Li,et al. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability , 2014, IEEE Journal of Biomedical and Health Informatics.
[27] Rui Zhang,et al. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[28] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[29] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[30] Xiong Li,et al. Applying biometrics to design three-factor remote user authentication scheme with key agreement , 2014, Secur. Commun. Networks.
[31] Han-Chieh Chao,et al. Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks , 2015, IEEE Communications Magazine.
[32] Elaine Shi,et al. Streaming Authenticated Data Structures , 2013, EUROCRYPT.
[33] Xin Zhou,et al. Data Authentication Model Based on Reed-solomon Error-correcting Codes in Wireless Sensor Networks , 2013 .
[34] Sherali Zeadally,et al. A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture , 2017, Computer.
[35] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.