Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security
暂无分享,去创建一个
[1] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[2] Aruna Seneviratne,et al. Kryptein: A Compressive-Sensing-Based Encryption Scheme for the Internet of Things , 2017, 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[3] Sriram Vishwanath,et al. Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.
[4] E. Candès. The restricted isometry property and its implications for compressed sensing , 2008 .
[5] Hao Liang,et al. Joint encryption and compressed sensing in smart grid data transmission , 2014, 2014 IEEE Global Communications Conference.
[6] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[7] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[8] David L Donoho,et al. Compressed sensing , 2006, IEEE Transactions on Information Theory.
[9] Wen Hu,et al. SimpleTrack: Adaptive Trajectory Compression With Deterministic Projection Matrix for Mobile Sensor Networks , 2014, IEEE Sensors Journal.
[10] Yanfei Sun,et al. A Hybrid Security and Compressive Sensing-Based Sensor Data Gathering Scheme , 2015, IEEE Access.
[11] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.
[12] Hideki Imai,et al. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents , 2001, CT-RSA.
[13] Brent Waters,et al. Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys , 2006, EUROCRYPT.
[14] H. Landau. Sampling, data transmission, and the Nyquist rate , 1967 .
[15] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[16] Christoph Ruland,et al. Compressive Sensing encryption modes and their security , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[17] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[18] Chun-Shien Lu,et al. Privacy-preserving data collection and recovery of compressive sensing , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[19] Cong Wang,et al. A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[20] Emmanuel J. Candès,et al. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.
[21] Anupam Chattopadhyay,et al. Secure and Lightweight Compressive Sensing Using Stream Cipher , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[22] Meng Zhang,et al. Energy-efficient and Secure Sensor Data Transmission Using Encompression , 2013, 2013 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems.