相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
Yanrong Lu et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
A synthetic research on the multimedia data encryption based mobile computing security enhancement model and multi-channel mobile human computer interaction framework
Jun Li
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
Analysis of interaction trace maps for active authentication on smart devices
Jamil Ahmad et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations
Muhammad Hammad Memon et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
Dynamic path privacy protection framework for continuous query service over road networks
Imran Memon et al.
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2017)
A learning-based comprehensive evaluation model for traffic data quality in intelligent transportation systems
Yidong Li et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
INSIGMA: an intelligent transportation system for urban mobility enhancement
Wojciech Chmiel et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
A traffic anomaly detection approach in communication networks for applications of multimedia medical devices
Dingde Jiang et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
QoS constraints-based energy-efficient model in cloud computing networks for multimedia clinical issues
Dingde Jiang et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
An efficient anonymous authentication protocol using batch operations for VANETs
Yawei Liu et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
Mobile context-based framework for threat monitoring in urban environment with social threat monitor
Szymon Bobek et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
Recommending multimedia visiting paths in cultural heritage applications
Ilaria Bartolini et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme
Imran Memon et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks
Imran Memon
WIRELESS PERSONAL COMMUNICATIONS (2015)
Authentication User's Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services
Imran Memon
WIRELESS PERSONAL COMMUNICATIONS (2015)
Designing a mobile language learning system based on lightweight learning objects
Milos Milutinovic et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
A context-aware mobile web middleware for service of surveillance video with privacy
Jie Shen et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
New detection method and countermeasure of cyber attacks in mix networks
Kwang Cheol Park et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions
Marco Furini et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery
Rizwan Akhtar et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
Travel Recommendation Using Geo-tagged Photos in Social Media for Tourist
Imran Memon et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
Mix-zones optimal deployment for protecting location privacy in VANET
Yipin Sun et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)
Multi-scale anomaly detection for high-speed network traffic
Dingde Jiang et al.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2015)
VANET security surveys
Richard Gilles Engoulou et al.
COMPUTER COMMUNICATIONS (2014)
Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications
Song Guo et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
A transform domain-based anomaly detection approach to network-wide traffic
Dingde Jiang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)
W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video
Mukesh Saini et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2014)
Using transcoding for hidden communication in IP telephony
Wojciech Mazurczyk et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2014)
Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)
Imran Memon et al.
WIRELESS PERSONAL COMMUNICATIONS (2014)
Dynamic Mix-Zone for Location Privacy in Vehicular Networks
Bidi Ying et al.
IEEE COMMUNICATIONS LETTERS (2013)
Non-Cooperative Location Privacy
Julien Freudiger et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2013)
Cooperative pseudonym change scheme based on the number of neighbors in VANETs
Yuanyuan Pan et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
Efficient Pseudonym Changing Schemes for Location Privacy Protection in VANETs
Yeong-Sheng Chen et al.
2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE) (2013)
Protocol of Change Pseudonyms for VANETs
Adetundji Adigun et al.
PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS) (2013)
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs
Rongxing Lu et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)
Joint time-frequency sparse estimation of large-scale network traffic
Dingde Jiang et al.
COMPUTER NETWORKS (2011)
A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)
Francisco J. Martinez et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2011)
An optimization method of large-scale IP traffic matrix estimation
Dingde Jiang et al.
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2010)
Mobility Models for Vehicular Ad Hoc Networks: A Survey and Taxonomy
Jerome Haerri et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)
INTER-VEHICLE COMMUNICATION SYSTEMS: A SURVEY
Mihail L. Sichitiu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)
Impact of denial of service attacks on ad hoc networks
Imad Aad et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2008)
Location privacy in pervasive computing
AR Beresford et al.
IEEE PERVASIVE COMPUTING (2003)