相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。GraphShield: Dynamic Large Graphs for Secure Queries With Forward Privacy
Minxin Du et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2022)
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
Shengmin Xu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things
Djamel Eddine Kouicem et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server
Hongcheng Xie et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing
Jianbing Ni et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Privbus: A privacy-enhanced crowdsourced bus service via fog computing
Yuanyuan He et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)
Practical and Secure Circular Range Search on Private Spatial Data
Zhihao Zheng et al.
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data
Xiangyu Wang et al.
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing
Dong Yuan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
Boyang Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data
Guowen Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision
Wenjuan Tang et al.
IEEE COMMUNICATIONS MAGAZINE (2019)
Efficient LBS queries with mutual privacy preservation in IoV
Shushu Liu et al.
VEHICULAR COMMUNICATIONS (2019)
pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service
Yuchuan Luo et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
Yaxing Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Toward Cloud-Assisted Industrial IoT Platform for Large-Scale Continuous Condition Monitoring
Gang Wang et al.
PROCEEDINGS OF THE IEEE (2019)
A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT
Rongxing Lu
IEEE INTERNET OF THINGS JOURNAL (2019)
Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem
Cheng Guo et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Sarvar Patel et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Encrypted Databases: New Volume Attacks against Range Queries
Zichen Gui et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Paul Grubbs et al.
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)
Computationally Volume-Hiding Structured Encryption
Seny Kamara et al.
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II (2019)
Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
Jianbing Ni et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Searchable Encryption over Feature-Rich Data
Qian Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries
Paul Grubbs et al.
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage
Marie-Sarah Lacharite et al.
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)
Efficient location privacy algorithm for Internet of Things (IoT) services and applications
Gang Sun et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Leakage-Abuse Attacks against Order-Revealing Encryption
Paul Grubbs et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
Privacy-Aware Dynamic Ride Sharing
Preeti Goel et al.
ACM TRANSACTIONS ON SPATIAL ALGORITHMS AND SYSTEMS (2016)
Practical Order-Revealing Encryption with Limited Leakage
Nathan Chenette et al.
FAST SOFTWARE ENCRYPTION (FSE 2016) (2016)
Leakage-Abuse Attacks Against Searchable Encryption
David Cash et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
Finding your Way in the Definition Fog: Towards a Comprehensive of Fog Computing
Luis M. Vaquero et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)
Analysis of the clustering properties of the Hilbert space-filling curve
B Moon et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2001)