DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream
暂无分享,去创建一个
Jinjun Chen | Rajiv Ranjan | Deepak Puthal | Surya Nepal | S. Nepal | Jinjun Chen | R. Ranjan | Deepak Puthal
[1] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[2] Samih Abdul-Nabi,et al. On Formula to Compute Primes and the n th Prime , 2012 .
[3] James M. Tien,et al. Big Data: Unleashing information , 2013, 2013 10th International Conference on Service Systems and Service Management.
[4] Ki-Woong Park,et al. Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices , 2008, IEEE Transactions on Computers.
[5] Rajiv Ranjan,et al. Streaming Big Data Processing in Datacenter Clouds , 2014, IEEE Cloud Computing.
[6] Elisa Bertino,et al. StreamShield: a stream-centric approach towards security and privacy in data stream environments , 2009, SIGMOD Conference.
[7] Michael Stonebraker,et al. The 8 requirements of real-time stream processing , 2005, SGMD.
[8] B. P. S. Sahoo,et al. Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.
[9] Jianguo Lu,et al. Bias Correction in a Small Sample from Big Data , 2013, IEEE Transactions on Knowledge and Data Engineering.
[10] I. Akyildiz. WIRELESS MULTIMEDIA SENSOR NETWORKS : A SURVEY The uthors discusse , 2022 .
[11] Jinjun Chen,et al. CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing , 2013, Future Gener. Comput. Syst..
[12] Frederick Reiss,et al. TelegraphCQ: continuous dataflow processing , 2003, SIGMOD '03.
[13] Toyotaro Suzumura,et al. Automatic optimization of stream programs via source program operator graph transformations , 2013, Distributed and Parallel Databases.
[14] Deepak Puthal. Secure Data Collection and Critical Data Transmission Technique in Mobile Sink Wireless Sensor Networks , 2012 .
[15] Albert Bifet,et al. Mining Big Data in Real Time , 2013, Informatica.
[16] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[17] Michael Stonebraker,et al. Monitoring Streams - A New Class of Data Management Applications , 2002, VLDB.
[18] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[19] John Zic,et al. A mobile and portable trusted computing platform , 2011, EURASIP J. Wirel. Commun. Netw..
[20] Dursun Delen,et al. Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud , 2013, Decis. Support Syst..
[21] Claudio Soriente,et al. StreamCloud: An Elastic and Scalable Data Streaming System , 2012, IEEE Transactions on Parallel and Distributed Systems.
[22] Todd M. Austin,et al. Architectural support for fast symmetric-key cryptography , 2000, SIGP.
[23] Marco Pistoia,et al. Enterprise Java 2 Security: Building Secure and Robust J2EE Applications , 2004 .
[24] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[25] Deepak Puthal,et al. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .