相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing
Jian Shen et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Secure attribute-based data sharing for resource-limited users in cloud computing
Jin Li et al.
COMPUTERS & SECURITY (2018)
Auction Mechanisms for Energy Trading in Multi-Energy Systems
Weifeng Zhong et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Social Big-Data-Based Content Dissemination in Internet of Vehicles
Zhenyu Zhou et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
Mimi Ma et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Anonymous and Traceable Group Data Sharing in Cloud Computing
Jian Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
A survey on security control and attack detection for industrial cyber-physical systems
Derui Ding et al.
NEUROCOMPUTING (2018)
Privacy-preserving outsourced classification in cloud computing
Ping Li et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel
Yinbin Miao et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)
Energy Big Data Security Threats in IoT-Based Smart Grid Communications
Wen-Long Chin et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
Jiaojiao Jiang et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection
Jingwei Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains
Jiawen Kang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
Jian Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
Jia Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
WIRELESS BIG DATA COMPUTING IN SMART GRID
Kun Wang et al.
IEEE WIRELESS COMMUNICATIONS (2017)
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Qiong Huang et al.
INFORMATION SCIENCES (2017)
被撤回的出版物: Dynamic remote data auditing for securing big data storage in cloud computing (Retracted article. See vol. 444, pg. 187, 2018)
Mehdi Sookhak et al.
INFORMATION SCIENCES (2017)
A belief propagation-based method for task allocation in open and dynamic cloud environments
Yan Kong et al.
KNOWLEDGE-BASED SYSTEMS (2017)
Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks
Jian Zhang et al.
INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2017)
Temperature error correction based on BP neural network in meteorological wireless sensor network
Baowei Wang et al.
INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2017)
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
Jian Shen et al.
PERVASIVE AND MOBILE COMPUTING (2017)
Organized topology based routing protocol in incompletely predictable ad-hoc networks
Jian Shen et al.
COMPUTER COMMUNICATIONS (2017)
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
Cengiz Orencik et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2016)
Symmetric searchable encryption with efficient range query using multi-layered linked chains
Nam-Su Jho et al.
JOURNAL OF SUPERCOMPUTING (2016)
Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder
Zhaoqing Pan et al.
IEEE TRANSACTIONS ON BROADCASTING (2016)
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Tao Jiang et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Verifiable Computation over Large Database with Incremental Updates
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Fair Energy Scheduling for Vehicle-to-Grid Networks Using Adaptive Dynamic Programming
Shengli Xie et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2016)
Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks
Jian Shen et al.
IEEE ACCESS (2016)
KDVEM: a k-degree anonymity with vertex and edge modification algorithm
Tinghuai Ma et al.
COMPUTING (2015)
New Publicly Verifiable Databases with Efficient Updates
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Segmentation-Based Image Copy-Move Forgery Detection Scheme
Jian Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
New Algorithms for Secure Outsourcing of Modular Exponentiations
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Identity-based chameleon hashing and signatures without key exposure
Xiaofeng Chen et al.
INFORMATION SCIENCES (2014)
Home M2M Networks: Architectures, Standards, and QoS Improvement
Yan Zhang et al.
IEEE COMMUNICATIONS MAGAZINE (2011)
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks
Yang Xiang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)