相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Privacy-Preserving Task Recommendation Services for Crowdsourcing
Jiangang Shu et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness
Chengjun Cai et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Blockchain for Internet of Energy management: Review, solutions, and challenges
Arzoo Miglani et al.
COMPUTER COMMUNICATIONS (2020)
Group public key encryption with equality test against offline message recovery attack
Yunhao Ling et al.
INFORMATION SCIENCES (2020)
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes
Chao Lin et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
SURVIVOR: A blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment
Anish Jindal et al.
COMPUTER NETWORKS (2019)
Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network
Zhen Yang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system
Rajat Chaudhary et al.
COMPUTERS & SECURITY (2019)
Blockchain for smart communities: Applications, challenges and opportunities
Shubhani Aggarwal et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
A survey on privacy protection in blockchain system
Qi Feng et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs
Zhaojun Lu et al.
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2019)
A Lattice-Based Public Key Encryption with Equality Test in Standard Model
Dung Hoang Duong et al.
INFORMATION SECURITY AND PRIVACY, ACISP 2019 (2019)
BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing
Yiming Wu et al.
IEEE ACCESS (2019)
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
Peng Xu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
Cong Zuo et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
Lun Li et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
Chao Lin et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Anonymous Privacy-Preserving Task Matching in Crowdsourcing
Jiangang Shu et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Branch based blockchain technology in intelligent vehicle
Madhusudan Singh et al.
COMPUTER NETWORKS (2018)
Practical Revocation and Key Rotation
Steven Myers et al.
TOPICS IN CRYPTOLOGY - CT-RSA 2018 (2018)
Efficient and secure identity-based encryption scheme with equality test in cloud computing
Libing Wu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Qiong Huang et al.
INFORMATION SCIENCES (2017)
ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network
Mohamed Amine Ferrag et al.
TELECOMMUNICATION SYSTEMS (2017)
Searchable Symmetric Encryption: Designs and Challe
Geong Sen Poh et al.
ACM COMPUTING SURVEYS (2017)
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
Yang Lu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
Identity-based encryption with outsourced equality test in cloud computing
Sha Ma
INFORMATION SCIENCES (2016)
Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud
Neeraj Kumar et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
Sha Ma et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis
Neeraj Kumar et al.
IEEE INTERNET OF THINGS JOURNAL (2015)
ALCA: agent learning-based clustering algorithm in vehicular ad hoc networks
Neeraj Kumar et al.
PERSONAL AND UBIQUITOUS COMPUTING (2013)
Proxy re-encryption with keyword search
Jun Shao et al.
INFORMATION SCIENCES (2010)