Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator
暂无分享,去创建一个
[1] Helger Lipmaa,et al. Secure Accumulators from Euclidean Rings without Trusted Setup , 2012, ACNS.
[2] Xiong Li,et al. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..
[3] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[4] Yueshen Xu,et al. Collaborative QoS Prediction for Mobile Service with Data Filtering and SlopeOne Model , 2017, Mob. Inf. Syst..
[5] Yueshen Xu,et al. QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..
[6] Jean-Jacques Quisquater,et al. Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.
[7] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[8] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[9] Jin Wang,et al. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[10] Yueshen Xu,et al. Collaborative Service Selection via Ensemble Learning in Mixed Mobile Network Environments , 2017, Entropy.
[11] Guangjie Han,et al. Edge Computing-Based Intelligent Manhole Cover Management System for Smart Cities , 2018, IEEE Internet of Things Journal.
[12] Yongjun Ren,et al. Digital Continuity Guarantee Based on Data Consistency in Cloud Storage , 2018, ICCCS.
[13] Yongjun Ren,et al. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system , 2019, J. Inf. Secur. Appl..
[14] Arun Kumar Sangaiah,et al. An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019, Human-centric Computing and Information Sciences.
[15] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[16] Yueshen Xu,et al. Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems , 2017, Sensors.
[17] Marcel Waldvogel,et al. Establishing trust in distributed storage providers , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[18] Jin Wang,et al. Spatial and semantic convolutional features for robust visual object tracking , 2018, Multimedia Tools and Applications.
[19] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[20] David Hutchison,et al. The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.
[21] Sherali Zeadally,et al. Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..
[22] Stefanos Gritzalis,et al. Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities , 2018, IEEE Transactions on Industrial Informatics.
[23] Hye-Jin Kim,et al. An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..
[24] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[25] Jianli Pan,et al. Future Edge Cloud and Edge Computing for Internet of Things Applications , 2018, IEEE Internet of Things Journal.
[26] Fan Wu,et al. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.
[27] Jin Wang,et al. An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks , 2019, Int. J. Distributed Sens. Networks.
[28] Arun Kumar Sangaiah,et al. Obstacle avoidance of mobile robots using modified artificial potential field algorithm , 2019, Other Conferences.
[29] Jinyue Xia,et al. Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds , 2019, IEEE Transactions on Dependable and Secure Computing.
[30] Ching-Han Chen,et al. Edge Computing Gateway of the Industrial Internet of Things Using Multiple Collaborative Microcontrollers , 2018, IEEE Network.
[31] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[32] Chin-Teng Lin,et al. Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment , 2018, IEEE Access.
[33] Yan Leng,et al. Secure data storage based on blockchain and coding in edge computing. , 2019, Mathematical biosciences and engineering : MBE.
[34] Bo Gao,et al. Fog Computing-Assisted Energy-Efficient Resource Allocation for High-Mobility MIMO-OFDMA Networks , 2018, Wirel. Commun. Mob. Comput..
[35] Sai Ji,et al. Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks , 2018, Mob. Inf. Syst..
[36] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[37] Jin Wang,et al. A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks , 2018 .
[38] Sushil Jajodia,et al. Integrity and Internal Control in Information Systems VI , 2013, IFIP International Federation for Information Processing.
[39] Fei Yu,et al. On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks , 2017, KSII Trans. Internet Inf. Syst..
[40] Ayad F. Barsoum,et al. Provable Possession and Replication of Data over Cloud Servers , 2011 .
[41] Arun Kumar Sangaiah,et al. Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things , 2019, Applied Sciences.
[42] Xuetao Wei,et al. Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications , 2019, IEEE Internet of Things Journal.
[43] Adeel Anjum,et al. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..
[44] Weisong Shi,et al. Falcon: An ambient temperature aware thermal control policy for IoT gateways , 2017, Sustain. Comput. Informatics Syst..
[45] Wenbing Wu,et al. An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks , 2019 .
[46] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[47] Walid I. Khedr,et al. Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage , 2019, IEEE Access.
[48] Yan Leng,et al. Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network , 2019, Sensors.
[49] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[50] LiuWei,et al. An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019 .
[51] Schahram Dustdar,et al. Going Back to the Roots—The Evolution of Edge Computing, An IoT Perspective , 2018, IEEE Internet Computing.
[52] Jin Wang,et al. RETRACTED ARTICLE: The visual object tracking algorithm research based on adaptive combination kernel , 2019, Journal of Ambient Intelligence and Humanized Computing.
[53] Ivan Damgård,et al. Supporting Non-membership Proofs with Bilinear-map Accumulators , 2008, IACR Cryptol. ePrint Arch..
[54] M. Anwar Hasan,et al. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems , 2015, IEEE Transactions on Information Forensics and Security.