Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
暂无分享,去创建一个
Xiaojiang Du | Mohsen Guizani | Liehuang Zhu | Kashif Sharif | Chang Xu | Chuan Zhang | Lvhan Zhang | M. Guizani | Xiaojiang Du | Chang Xu | Liehuang Zhu | K. Sharif | Chuan Zhang | Lvhan Zhang
[1] Cheng Huang,et al. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems , 2017, Sensors.
[2] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[3] Yi Mu,et al. Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud , 2018, IEEE Transactions on Information Forensics and Security.
[4] Sheng Zhong,et al. Privacy-Preserving Data Aggregation in Mobile Phone Sensing , 2016, IEEE Transactions on Information Forensics and Security.
[5] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[8] Sheng Zhong,et al. Efficient and Privacy-Preserving Min and $k$ th Min Computations in Mobile Sensing Systems , 2017, IEEE Transactions on Dependable and Secure Computing.
[9] Satyajayant Misra,et al. Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[10] Jian Shen,et al. Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids , 2017, IEEE Transactions on Information Forensics and Security.
[11] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[12] Claudio Bettini,et al. JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[13] Mauro Conti,et al. Privacy-Aware Caching in Information-Centric Networking , 2019, IEEE Transactions on Dependable and Secure Computing.
[14] Wei Li,et al. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.
[15] Yong Zhou,et al. Efficient Solutions to Two-Party and Multiparty Millionaires' Problem , 2017, Secur. Commun. Networks.
[16] Mohsen Guizani,et al. A survey of Internet of Things communication using ICN: A use case perspective , 2019, Comput. Commun..
[17] Yi Mu,et al. A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance , 2019, Future Gener. Comput. Syst..
[18] Yu Wang,et al. ICN Publisher-Subscriber Models: Challenges and Group-based Communication , 2019, IEEE Network.
[19] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[20] Christof Paar,et al. An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists , 2001, IEEE Trans. Very Large Scale Integr. Syst..
[21] Sugang Ma,et al. Lightweight and Privacy-Preserving Data Aggregation for Mobile Multimedia Security , 2019, IEEE Access.
[22] Mohsen Guizani,et al. LPTD: Achieving Lightweight and Privacy-Preserving Truth Discovery in CIoT , 2018, Future Gener. Comput. Syst..
[23] Shaojie Tang,et al. Privacy-Preserving Selective Aggregation of Online User Behavior Data , 2017, IEEE Transactions on Computers.
[24] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[25] Adi Shamir,et al. How to share a secret , 1979, CACM.
[26] Robert H. Deng,et al. Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things , 2022, IEEE Transactions on Cloud Computing.
[27] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.