A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data
暂无分享,去创建一个
[1] Jian Zhang,et al. Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks , 2017, Int. J. Sens. Networks.
[2] Xingming Sun,et al. Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder , 2016, IEEE Transactions on Broadcasting.
[3] Jin Li,et al. Identity-based chameleon hashing and signatures without key exposure , 2014, Inf. Sci..
[4] Jingwei Li,et al. MMB$^{cloud}$ -Tree: Authenticated Index for Verifiable Cloud Service Selection , 2017, IEEE Transactions on Dependable and Secure Computing.
[5] Murat Kantarcioglu,et al. Multi-Keyword search over encrypted data with scoring and search pattern obfuscation , 2015, International Journal of Information Security.
[6] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[7] Rajkumar Buyya,et al. Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..
[8] Jian Shen,et al. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.
[9] Li Ma,et al. Temperature error correction based on BP neural network in meteorological wireless sensor network , 2017, Int. J. Sens. Networks.
[10] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[11] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[12] Feng Xia,et al. Big Scholarly Data: A Survey , 2017, IEEE Transactions on Big Data.
[13] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[14] Xu An Wang,et al. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel , 2016, Peer-to-Peer Networking and Applications.
[15] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[16] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[17] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[18] Feihong Gu,et al. Compressive sensing of piezoelectric sensor response signal for phased array structural health monitoring , 2017, Int. J. Sens. Networks.
[19] Yan Zhang,et al. Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.
[20] Jian Shen,et al. Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[21] LiJin,et al. Identity-based chameleon hashing and signatures without key exposure , 2014 .
[22] Jianhua Chen,et al. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[23] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[24] Jian Shen,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..
[25] Shahid Mumtaz,et al. Social Big-Data-Based Content Dissemination in Internet of Vehicles , 2018, IEEE Transactions on Industrial Informatics.
[26] Der-Jiunn Deng,et al. Wireless Big Data Computing in Smart Grid , 2017, IEEE Wireless Communications.
[27] Minjie Zhang,et al. A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..
[28] Tinghuai Ma,et al. KDVEM : a k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.
[29] Mohsen Guizani,et al. Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.
[30] Yulei Wu,et al. Coverless Information Hiding Method Based on the Chinese Character Encoding , 2017 .
[31] Minyi Guo,et al. Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[32] Shengli Xie,et al. Fair Energy Scheduling for Vehicle-to-Grid Networks Using Adaptive Dynamic Programming , 2016, IEEE Transactions on Neural Networks and Learning Systems.
[33] Wen-Long Chin,et al. Energy Big Data Security Threats in IoT-Based Smart Grid Communications , 2017, IEEE Communications Magazine.
[34] Qiong Huang,et al. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks , 2017, Inf. Sci..
[35] Dowon Hong,et al. Symmetric searchable encryption with efficient range query using multi-layered linked chains , 2015, The Journal of Supercomputing.
[36] Jia Yu,et al. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[37] Wanlei Zhou,et al. Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.
[38] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[39] Chao Yang,et al. Auction Mechanisms for Energy Trading in Multi-Energy Systems , 2018, IEEE Transactions on Industrial Informatics.
[40] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[41] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.
[42] Chen Wang,et al. Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks , 2016, IEEE Access.
[43] Tao Jiang,et al. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation , 2016, IEEE Transactions on Computers.
[44] Jian Shen,et al. Organized topology based routing protocol in incompletely predictable ad-hoc networks , 2017, Comput. Commun..
[45] Prasenjit Mitra,et al. AlgorithmSeer: A System for Extracting and Searching for Algorithms in Scholarly Big Data , 2016, IEEE Transactions on Big Data.