An Efferent and Secure Outsourced Data Aggregation Using Location Sharing Services
暂无分享,去创建一个
[1] Alvaro Paricio Garcia,et al. An intelligent agent-based distributed architecture for Smart-Grid integrated network management , 2010, IEEE Local Computer Network Conference.
[2] Hua Liu,et al. Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system , 2017, Cluster Computing.
[3] Arepalli Peda Gopi,et al. Protected strength approach for image steganography , 2017, Traitement du Signal.
[4] Martin Spring,et al. Third party logistics : a literature review and research agenda , 2007 .
[5] Ian H. Witten,et al. Managing Gigabytes: Compressing and Indexing Documents and Images , 1999 .
[6] Naranker Dulay,et al. Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications , 2011, IFIPTM.
[7] Georgios K. Ouzounis,et al. Smart cities of the future , 2012, The European Physical Journal Special Topics.
[8] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[9] Arepalli Peda Gopi,et al. Visual cryptography for gray scale images with enhanced security mechanisms , 2017, Traitement du Signal.
[10] Ling Liu,et al. Preserving data privacy in outsourcing data aggregation services , 2007, TOIT.
[11] Donald G. Bailey,et al. VIPS - a digital image processing algorithm development environment , 1988, Image Vis. Comput..
[12] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[13] Alia I. Abdelmoty,et al. Maintaining Ontologies for Geographical Information Retrieval on the Web , 2003, OTM.
[14] Jean-Pierre Hubaux,et al. Privacy in Mobile Computing for Location-Sharing-Based Services , 2011, PETS.
[15] Paul Francis,et al. Non-tracking web analytics , 2012, CCS.
[16] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[17] Qiong Huang,et al. Privacy-Preserving Location Sharing Services for Social Networks , 2017, IEEE Transactions on Services Computing.
[18] Guanling Chen,et al. Sharing location in online social networks , 2010, IEEE Network.
[19] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[20] H. Vincent Poor,et al. Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.
[21] Ling Liu,et al. Mining multiple private databases using a kNN classifier , 2007, SAC '07.
[22] William W. Cohen,et al. Semi-Markov Conditional Random Fields for Information Extraction , 2004, NIPS.
[23] Henry A. Kautz,et al. Hierarchical Conditional Random Fields for GPS-Based Activity Recognition , 2005, ISRR.
[24] Lathies Bhasker. Genetically derived secure cluster-based data aggregation in wireless sensor networks , 2014, IET Inf. Secur..
[25] Thulasi Bikku. A new weighted based frequent and infrequent pattern mining method on realtime E-commerce , 2018, Ingénierie des Systèmes d Inf..
[26] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[27] Vangelis Metsis,et al. IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.
[28] Bart Preneel,et al. Practical privacy-preserving location-sharing based services with aggregate statistics , 2014, WiSec '14.
[29] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.