Accountable mobile E-commerce scheme in intelligent cloud system transactions
暂无分享,去创建一个
Mingwu Zhang | Yan Jiang | Yao Yao | Chunming Tang | Bingbing Li | Bingbing Li | Chunming Tang | Yao Yao | Mingwu Zhang | Yan Jiang
[1] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Juan Yang,et al. Reconstruction of traditional e-commerce system based on workflow technology , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.
[4] Debmalya Biswas,et al. Privacy preserving and transactional advertising for mobile services , 2013, Computing.
[5] Raúl Montoliu,et al. Comprehensive analysis of distance and similarity measures for Wi-Fi fingerprinting indoor positioning systems , 2015, Expert Syst. Appl..
[6] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[7] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[8] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[9] Hojung Cha,et al. Crowdsensing-based Wi-Fi radio map management using a lightweight site survey , 2015, Comput. Commun..
[10] Fatos Xhafa,et al. Supporting situated computing with intelligent multi-agent systems , 2011, Int. J. Space Based Situated Comput..
[11] Yi Mu,et al. Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations , 2016, Comput. J..
[12] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[13] Xiao Lei,et al. Designation and Realization of Mobile Commerce Interaction Model Under Cloud Computing Platform , 2013 .
[14] Rajkumar Buyya,et al. Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[15] Dong Hoon Lee,et al. An efficient IBE scheme with tight security reduction in the random oracle model , 2015, Designs, Codes and Cryptography.
[16] Sha Ma,et al. Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..
[17] N. K. Shankaranarayanan,et al. Design and Characterization of a Full-Duplex Multiantenna System for WiFi Networks , 2012, IEEE Transactions on Vehicular Technology.
[18] Tom Rodden,et al. MultiNet: usable and secure WiFi device association , 2012, SIGCOMM '12.
[19] Upkar Varshney,et al. Issues in Emerging 4G Wireless Networks , 2001, Computer.
[20] Tsz Hon Yuen,et al. Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption , 2016, Inf. Sci..
[21] Shengbao Wang,et al. Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications , 2007, IACR Cryptol. ePrint Arch..
[22] Mingwu Zhang,et al. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.
[23] Anup K. Ghosh,et al. Software security and privacy risks in mobile e-commerce , 2001, CACM.
[24] Xiaoyuan Yang,et al. Protecting data in cloud environment with attribute-based encryption , 2015, Int. J. Grid Util. Comput..
[25] Georg Fuchsbauer,et al. Plaintext-Checkable Encryption , 2012, CT-RSA.
[26] Keita Emura,et al. Revocable hierarchical identity-based encryption , 2014, Theor. Comput. Sci..
[27] Ren-Hung Hwang,et al. Context-aware multimedia broadcast and multicast service area planning in 4G networks , 2015, Comput. Commun..
[28] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[29] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[30] Hyoung-Kee Choi,et al. Security Analysis of Handover Key Management in 4G LTE/SAE Networks , 2014, IEEE Transactions on Mobile Computing.
[31] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[32] Dapeng Wu,et al. Mobile Privacy in Wireless Networks-Revisited , 2008, IEEE Transactions on Wireless Communications.
[33] Dong Hoon Lee,et al. Efficient Privacy-Preserving Authentication in Wireless Mobile Networks , 2014, IEEE Transactions on Mobile Computing.