Privacy preserved wireless sensor location protocols based on mobile edge computing
暂无分享,去创建一个
Hao Wang | Han Jiang | Qiuliang Xu | Zhihua Zheng | Qiuliang Xu | Hao Wang | Han Jiang | Zhihua Zheng
[1] Craig Gentry,et al. (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.
[2] Elena Simona Lohan,et al. Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.
[3] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[4] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[5] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[8] Patrick Traynor,et al. Secure outsourced garbled circuit evaluation for mobile devices , 2013, J. Comput. Secur..
[9] Ivan Stojmenovic,et al. An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[12] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[13] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[14] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[15] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[16] Yong Guan,et al. Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[17] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[18] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[19] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[20] Gerhard P. Hancke,et al. Distance Bounding: A Practical Security Solution for Real-Time Location Systems , 2013, IEEE Transactions on Industrial Informatics.
[21] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[22] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[23] Jiannong Cao,et al. Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.