An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network
暂无分享,去创建一个
Xiaojiang Du | Xiaolu Li | Rong Sun | Jingwei Liu | E. Paul Ratazzi | Xiaojiang Du | Rong Sun | Jingwei Liu | Xiaolu Li | P. Ratazzi
[1] Jun Zhang,et al. Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.
[2] Qinghua Zheng,et al. Secure Content Delivery With Edge Nodes to Save Caching Resources for Mobile Users in Green Cities , 2018, IEEE Transactions on Industrial Informatics.
[3] Xiaoying Gan,et al. Analytical model with a novel selfishness division of mobile nodes to participate cooperation , 2016, Peer-to-Peer Netw. Appl..
[4] M. Hansen,et al. Participatory Sensing , 2019, Internet of Things.
[5] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[6] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.
[7] Mohsen Guizani,et al. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[8] Minho Shin,et al. Anonysense: privacy-aware people-centric sensing , 2008, MobiSys '08.
[9] Qinghua Li,et al. Providing Efficient Privacy-Aware Incentives for Mobile Sensing , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[10] Baik Hoh,et al. Sell your experiences: a market mechanism based incentive for participatory sensing , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[11] Sivan Toledo,et al. VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.
[12] Joonsang Baek,et al. A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.
[13] Jiajia Liu,et al. Smart Attacks against Intelligent Wearables in People-Centric Internet of Things , 2016, IEEE Communications Magazine.
[14] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[15] Pramod K. Varshney,et al. An auction-based mechanism for dynamic spectrum allocation in participatory cognitive radio networks , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[16] Deborah Estrin,et al. AndWellness: an open mobile system for activity and experience sampling , 2010, Wireless Health.
[17] Claudio Soriente,et al. Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure , 2011, WiSec '11.
[18] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[19] Deborah Estrin,et al. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.
[20] Xiaojiang Du,et al. Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..
[21] Wanlei Zhou,et al. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.
[22] Fei Hu,et al. Optimized scheduling for data aggregation in wireless sensor networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[23] Reihaneh Safavi-Naini,et al. Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings , 2003, INDOCRYPT.
[24] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[25] Wanlei Zhou,et al. Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.
[26] Haibin Zhang,et al. Connecting Intelligent Things in Smart Hospitals Using NB-IoT , 2018, IEEE Internet of Things Journal.
[27] Chase Qishi Wu,et al. Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[28] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[29] Minyi Guo,et al. A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking , 2016, IEEE Transactions on Computers.
[30] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[31] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[32] Song Guo,et al. Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient , 2012, IEEE Transactions on Parallel and Distributed Systems.