Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage
暂无分享,去创建一个
[1] Yang Li,et al. LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks , 2018, Journal of Computer Science and Technology.
[2] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[3] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[4] Fang Liu,et al. Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.
[5] Maher Jridi,et al. SoC-Based Edge Computing Gateway in the Context of the Internet of Multimedia Things: Experimental Platform , 2018 .
[6] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[7] Jian Li,et al. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud , 2017, IEEE Transactions on Cloud Computing.
[8] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[9] Dijiang Huang,et al. MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.
[10] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[11] JUSTIN ZOBEL,et al. Inverted files for text search engines , 2006, CSUR.
[12] Marianne Winslett,et al. Zerber: r-confidential indexing for distributed documents , 2008, EDBT '08.
[13] Byung-Gon Chun,et al. CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.
[14] WADOOD ABDUL,et al. Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.
[15] Liehuang Zhu,et al. Search pattern leakage in searchable encryption: Attacks and new construction , 2014, Inf. Sci..
[16] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[17] Chi-Sheng Shih,et al. An Online Migration Environment for Executing Mobile Applications on the Cloud , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[18] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[19] Naixue Xiong,et al. A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks , 2018, Sensors.
[20] Qiang Liu,et al. A Survey on Security-Aware Measurement in SDN , 2018, Secur. Commun. Networks.
[21] Jiannong Cao,et al. A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering , 2013, IEEE Transactions on Computers.
[22] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[23] Brent Waters,et al. Building an Encrypted and Searchable Audit Log , 2004, NDSS.
[24] Anfeng Liu,et al. A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs , 2018, IEEE Access.
[25] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[26] Wolfgang Nejdl,et al. Zerber+R: top-k retrieval from a confidential index , 2009, EDBT '09.
[27] Jukka K. Nurminen,et al. Energy Efficiency of Mobile Clients in Cloud Computing , 2010, HotCloud.
[28] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[29] Fang Liu,et al. A Clustering k-Anonymity Privacy-Preserving Method for Wearable IoT Devices , 2018, Secur. Commun. Networks.
[30] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[31] Laura Vasiliu,et al. CloneCloud: Elastic Execution between Mobile Device and Cloud , 2012 .
[32] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[33] Chaokun Wang,et al. Phosphor: A Cloud Based DRM Scheme with Sim Card , 2010, 2010 12th International Asia-Pacific Web Conference.
[34] Naixue Xiong,et al. QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks , 2018, IEEE Access.
[35] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[36] Mayank Dave,et al. Data security protocol for cloudlet based architecture , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).
[37] Sukhwinder Singh,et al. Mobile Cloud Computing , 2014 .