Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature
暂无分享,去创建一个
Fengyin Li | Huiyu Zhou | Yilei Wang | Rui Ge | Xiaomei Yu | Zhongxing Liu | Xiaomei Yu | Yilei Wang | Huiyu Zhou | Fengyin Li | R. Ge | Zhongxing Liu
[1] Xinchun Cui,et al. Secure computation protocols under asymmetric scenarios in enterprise information system , 2019, Enterp. Inf. Syst..
[2] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Jian Shen,et al. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.
[4] Yu Zhang,et al. Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications , 2011, IEEE Transactions on Mobile Computing.
[5] Fengyuan Xu,et al. SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.
[6] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[7] Debiao He,et al. New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment , 2018, Secur. Commun. Networks.
[8] Chin-Chen Chang,et al. Public audit for operation behavior logs with error locating in cloud storage , 2019, Soft Comput..
[9] Xiaohui Liang,et al. SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[10] Anupam Das,et al. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems , 2012, IEEE Transactions on Dependable and Secure Computing.
[11] Hong Liu,et al. A scalable coevolutionary multi-objective particle swarm optimizer , 2010, Int. J. Comput. Intell. Syst..
[12] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[13] Hao Wang,et al. Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps , 2018, Soft Comput..
[14] Hridesh Rajan,et al. Tisa: Toward Trustworthy Services in a Service-Oriented Architecture , 2008, IEEE Transactions on Services Computing.
[15] Witold Pedrycz,et al. Publicly verifiable privacy-preserving aggregation and its application in IoT , 2019, J. Netw. Comput. Appl..
[16] R. R. Rejimol Robinson,et al. Evaluation of mitigation methods for distributed denial of service attacks , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).
[17] Fengyin Li,et al. A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..
[18] Nima Jafari Navimipour,et al. Trust evaluation between users of social networks using the quality of service requirements and call log histories , 2016, Kybernetes.
[19] S. RaijaSulthana,et al. SYBILDEFENDER: DEFEND AGAINST SYBIL ATTACKS IN LARGE SOCIAL NETWORKS , 2015 .
[20] Hao Wang,et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.
[21] Hao Wang,et al. New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.
[22] Xiaohui Liang,et al. Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks , 2022 .
[23] Lei Li,et al. Two-dimensional trust rating aggregations in service-oriented applications , 2011, IEEE Transactions on Services Computing.
[24] Tao Li,et al. Randomness invalidates criminal smart contracts , 2019, Inf. Sci..
[25] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[26] Erman Ayday,et al. Iterative Trust and Reputation Management Using Belief Propagation , 2012, IEEE Transactions on Dependable and Secure Computing.
[27] Hongyang Yan,et al. Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records , 2019, IEEE Access.
[28] Jiming Chen,et al. VTube: Towards the media rich city life with autonomous vehicular content distribution , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[29] Liehuang Zhu,et al. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks , 2018, Sensors.
[30] Xiangwei Zheng,et al. A Multidomain Survivable Virtual Network Mapping Algorithm , 2017, Secur. Commun. Networks.
[31] Xiaohui Liang,et al. Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.