暂无分享,去创建一个
[1] Y. Bevish Jinila,et al. An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet , 2014 .
[2] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[3] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[4] Bart Preneel,et al. Location privacy in wireless personal area networks , 2006, WiSe '06.
[5] A. Klinger. THE VANDERMONDE MATRIX , 1967 .
[6] Song Guo,et al. On the Throughput of Two-Way Relay Networks Using Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Li-Chun Wang,et al. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[8] David C. Parkes,et al. Non-Cooperative Location Privacy , 2013, IEEE Transactions on Dependable and Secure Computing.
[9] Yang Tang,et al. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds , 2014, IEEE Transactions on Computers.
[10] João Barros,et al. Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.
[11] H. T. Mouftah,et al. Dynamic Mix-Zone for Location Privacy in Vehicular Networks , 2013, IEEE Communications Letters.
[12] A. Gurjar,et al. Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[13] Ning Cai,et al. Network coding and error correction , 2002, Proceedings of the IEEE Information Theory Workshop.
[14] Marco Gruteser,et al. USENIX Association , 1992 .
[15] Kaoru Sezaki,et al. Enhancing wireless location privacy using silent period , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[16] Jian Li,et al. An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[17] Yuguang Fang,et al. A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.
[18] Muriel Médard,et al. Coding for Trusted Storage in Untrusted Networks , 2012, IEEE Transactions on Information Forensics and Security.
[19] Dijiang Huang,et al. Enabling secure location-based services in mobile cloud computing , 2013, MCC '13.
[20] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[21] Dhananjay Kumar,et al. Rainbow table to crack password using MD5 hashing algorithm , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[22] Kevin W. Hamlen,et al. AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[23] Chi-Yin Chow,et al. Privacy in location-based services: a system architecture perspective , 2009, SIGSPACIAL.
[24] Patrick P. C. Lee,et al. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.
[25] Tao Xiang,et al. Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[26] Yuanzhang Li,et al. Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups , 2011, J. Comput..
[27] Muriel Médard,et al. An algebraic approach to network coding , 2003, TNET.
[28] Dimitrios Makrakis,et al. Protecting Location Privacy with Clustering Anonymization in vehicular networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[29] Li-Chun Wang,et al. Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems , 2016, IEEE Transactions on Parallel and Distributed Systems.
[30] Ling-Jyh Chen,et al. SUDO: a secure database outsourcing solution for location-based systems , 2014, GeoPrivacy '14.
[31] Fengming Bai,et al. A Distributed Cross-Realm Identification Scheme Based on Hyperchaos System , 2011, CSISE.
[32] Svetlana Peltsverger,et al. The security of cryptographic hashes , 2011, ACM-SE '11.
[33] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[34] Kang-Won Lee,et al. Understanding Processing Overheads of Network Coding-Based Content Distribution in VANETs , 2013, IEEE Transactions on Parallel and Distributed Systems.
[35] Alexandre M. Bayen,et al. Mobile Phones as Seismologic Sensors: Automating Data Extraction for the iShake System , 2013, IEEE Transactions on Automation Science and Engineering.
[36] Fumiaki Sato,et al. A Hybrid Method of User Privacy Protection for Location Based Services , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.
[37] Anantha Chandrakasan,et al. Energy-Aware Hardware Implementation of Network Coding , 2011, Networking Workshops.
[38] Y. Bevish Jinila,et al. An effective strategy for pseudonym generation & changing scheme with privacy preservation for vanet , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[39] Guohong Cao,et al. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.
[40] Wenjing Lou,et al. Security, privacy, and accountability in wireless access networks , 2009, IEEE Wireless Communications.
[41] Guang Gong,et al. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers , 2012, 2012 IEEE International Conference on Communications (ICC).
[42] Juan C. Yelmo,et al. A Privacy-Considerate Framework for Identity Management in Mobile Services , 2011, Mob. Networks Appl..
[43] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).