4.7 Article

A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing

Jian Shen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Secure attribute-based data sharing for resource-limited users in cloud computing

Jin Li et al.

COMPUTERS & SECURITY (2018)

Article Automation & Control Systems

Auction Mechanisms for Energy Trading in Multi-Energy Systems

Weifeng Zhong et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Automation & Control Systems

Social Big-Data-Based Content Dissemination in Internet of Vehicles

Zhenyu Zhou et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Automation & Control Systems

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Mimi Ma et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

Anonymous and Traceable Group Data Sharing in Cloud Computing

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Artificial Intelligence

A survey on security control and attack detection for industrial cyber-physical systems

Derui Ding et al.

NEUROCOMPUTING (2018)

Article Computer Science, Information Systems

Privacy-preserving outsourced classification in cloud computing

Ping Li et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel

Yinbin Miao et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

Energy Big Data Security Threats in IoT-Based Smart Grid Communications

Wen-Long Chin et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies

Jiaojiao Jiang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Hardware & Architecture

MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection

Jingwei Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)

Article Automation & Control Systems

Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains

Jiawen Kang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Theory & Methods

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Hardware & Architecture

WIRELESS BIG DATA COMPUTING IN SMART GRID

Kun Wang et al.

IEEE WIRELESS COMMUNICATIONS (2017)

Article Computer Science, Information Systems

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Qiong Huang et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Artificial Intelligence

A belief propagation-based method for task allocation in open and dynamic cloud environments

Yan Kong et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Computer Science, Information Systems

Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks

Jian Zhang et al.

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2017)

Article Computer Science, Information Systems

Temperature error correction based on BP neural network in meteorological wireless sensor network

Baowei Wang et al.

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2017)

Article Computer Science, Information Systems

A secure cloud-assisted urban data sharing framework for ubiquitous-cities

Jian Shen et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Article Computer Science, Information Systems

Organized topology based routing protocol in incompletely predictable ad-hoc networks

Jian Shen et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Multi-Keyword search over encrypted data with scoring and search pattern obfuscation

Cengiz Orencik et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2016)

Article Computer Science, Hardware & Architecture

Symmetric searchable encryption with efficient range query using multi-layered linked chains

Nam-Su Jho et al.

JOURNAL OF SUPERCOMPUTING (2016)

Article Engineering, Electrical & Electronic

Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder

Zhaoqing Pan et al.

IEEE TRANSACTIONS ON BROADCASTING (2016)

Article Computer Science, Hardware & Architecture

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Tao Jiang et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Hardware & Architecture

Verifiable Computation over Large Database with Incremental Updates

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Artificial Intelligence

Fair Energy Scheduling for Vehicle-to-Grid Networks Using Adaptive Dynamic Programming

Shengli Xie et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2016)

Article Computer Science, Information Systems

Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks

Jian Shen et al.

IEEE ACCESS (2016)

Article Computer Science, Theory & Methods

KDVEM: a k-degree anonymity with vertex and edge modification algorithm

Tinghuai Ma et al.

COMPUTING (2015)

Article Computer Science, Hardware & Architecture

New Publicly Verifiable Databases with Efficient Updates

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Theory & Methods

Segmentation-Based Image Copy-Move Forgery Detection Scheme

Jian Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Identity-based chameleon hashing and signatures without key exposure

Xiaofeng Chen et al.

INFORMATION SCIENCES (2014)

Article Engineering, Electrical & Electronic

Home M2M Networks: Architectures, Standards, and QoS Improvement

Yan Zhang et al.

IEEE COMMUNICATIONS MAGAZINE (2011)

Article Computer Science, Theory & Methods

Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks

Yang Xiang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)