4.7 Article

TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things

Shengmin Xu et al.

Summary: Healthcare Internet-of-Things (IoT) is a new paradigm that connects embedded devices to the cloud for monitoring patient vital signals and data aggregation. However, there are security concerns with the cloud due to untrusted network environments and limited resources. To address this, this paper proposes a novel healthcare IoT system that combines attribute-based encryption, cloud and edge computing to provide efficient, flexible, secure fine-grained access control and data verification, without the need for a secure channel.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Trust Assessment in Online Social Networks

Guangchi Liu et al.

Summary: This paper proposes the three-valued subjective logic (3VSL) model to assess trust in online social networks, and further designs the AssessTrust (AT) algorithm to accurately compute trust between any two users. Experimental results validate that 3VSL can accurately model trust between indirectly connected users.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

MP-Coopetition: Competitive and Cooperative Mechanism for Multiple Platforms in Mobile Crowd Sensing

Youqi Li et al.

Summary: This paper studies incentive mechanisms in Mobile Crowd Sensing (MCS) with multiple platforms, including competitive platform and cooperative platform scenarios, proposing new mechanisms to attract more participants and increase profits.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Theory & Methods

AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network

Qingyou Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

A Context-Aware Multiarmed Bandit Incentive Mechanism for Mobile Crowd Sensing Systems

Yue Wu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT

Chuan Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

Trust-based security adaptation mechanism for Vehicular Sensor Networks

Muhammad Awais Javed et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Hardware & Architecture

RTSense: Providing Reliable Trust-Based Crowdsensing Services in CVCC

Liehuang Zhu et al.

IEEE NETWORK (2018)

Article Engineering, Electrical & Electronic

PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications

Jie Xu et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2018)

Article Automation & Control Systems

Social Big-Data-Based Content Dissemination in Internet of Vehicles

Zhenyu Zhou et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles

Liehuang Zhu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Computational Intelligence Inspired Data Delivery for Vehicle-to-Roadside Communications

Celimuge Wu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

TPSQ: Trust-based platoon service query via vehicular communications

Hao Hu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Cloud-Based Malware Detection Game for Mobile Devices with Offloading

Liang Xiao et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)

Article Engineering, Electrical & Electronic

REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET

Hao Hu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Performance Analysis of IEEE 802.11p DCF for Multiplatooning Communications With Autonomous Vehicles

Haixia Peng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT

Rongxing Lu et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning

Chang Xu et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

A Survey on Platoon-Based Vehicular Cyber-Physical Systems

Dongyao Jia et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Artificial Intelligence

Conflicts to Harmony: A Framework for Resolving Conflicts in Heterogeneous Data by Truth Discovery

Yaliang Li et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2016)

Article Engineering, Electrical & Electronic

Toward Trustworthy Vehicular Social Networks

Qing Yang et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

BEEINFO: Interest-Based Forwarding Using Artificial Bee Colony for Socially Aware Networking

Feng Xia et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2015)

Proceedings Paper Computer Science, Theory & Methods

Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems

Chenglin Miao et al.

SENSYS'15: PROCEEDINGS OF THE 13TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (2015)

Article Engineering, Electrical & Electronic

A Disturbance-Adaptive Design for VANET-Enabled Vehicle Platoon

Dongyao Jia et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2014)

Article Engineering, Electrical & Electronic

Communication Information Structures and Contents for Enhanced Safety of Highway Vehicle Platoons

Lijian Xu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2014)

Article Computer Science, Artificial Intelligence

Privacy-Preserving Tuple Matching in Distributed Databases

Yingpeng Sang et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2009)

Article Computer Science, Information Systems

An effective key management scheme for heterogeneous sensor networks

Xiaojiang Du et al.

AD HOC NETWORKS (2007)

Article Computer Science, Theory & Methods

Short signatures from the Weil pairing

D Boneh et al.

JOURNAL OF CRYPTOLOGY (2004)