Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection | 0 | 0.34 | 2022 |
Mitigating the Backdoor Attack by Federated Filters for Industrial IoT Applications | 0 | 0.34 | 2022 |
Editorial: Security of cloud service for the manufacturing industry | 0 | 0.34 | 2022 |
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes | 0 | 0.34 | 2022 |
Secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 Applications | 0 | 0.34 | 2022 |
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption | 1 | 0.36 | 2022 |
Cetus: An Efficient Symmetric Searchable Encryption Against File-Injection Attack With Sgx | 0 | 0.34 | 2021 |
Frequency-hiding order-preserving encryption with small client storage | 0 | 0.34 | 2021 |
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching | 0 | 0.34 | 2021 |
Frequency-Hiding Order-Preserving Encryption with Small Client Storage. | 0 | 0.34 | 2021 |
PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage | 2 | 0.37 | 2021 |
Editorial: Security and Privacy in Computing and Communications | 0 | 0.34 | 2021 |
Reversible Information Hiding Algorithm Based on Multikey Encryption | 0 | 0.34 | 2020 |
Secure Deduplication System with Active Key Update and Its Application in IoT | 0 | 0.34 | 2019 |
An efficient DDoS detection based on SU-Genetic feature selection | 0 | 0.34 | 2019 |
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer. | 0 | 0.34 | 2018 |
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition. | 16 | 0.60 | 2018 |
Multi-authority fine-grained access control with accountability and its application in cloud. | 35 | 0.82 | 2018 |
Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings | 0 | 0.34 | 2018 |
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information. | 1 | 0.35 | 2018 |
A Distributed Anomaly Detection System for In-Vehicle Network Using HTM. | 6 | 0.49 | 2018 |
Key-Aggregate Searchable Encryption Under Multi-Owner Setting For Group Data Sharing In The Cloud | 0 | 0.34 | 2018 |
Verifiable searchable encryption with aggregate keys for data sharing system. | 27 | 0.90 | 2018 |
Data Provenance With Retention of Reference Relations. | 0 | 0.34 | 2018 |
Channel State Information-Based Detection of Sybil Attacks in Wireless Networks. | 0 | 0.34 | 2018 |
Differentially private Naive Bayes learning over multiple data sources. | 50 | 1.03 | 2018 |
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices. | 12 | 0.46 | 2018 |
ShadowPWD: practical browser-based password manager with a security token. | 0 | 0.34 | 2017 |
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance. | 2 | 0.36 | 2017 |
Efficient Format-Preserving Encryption Mode for Integer | 0 | 0.34 | 2017 |
CDPS: A cryptographic data publishing system. | 5 | 0.45 | 2017 |
Constant bandwidth ORAM with small block size using PIR operations. | 0 | 0.34 | 2017 |
Partition ORAMS Combined with Novel Client Eviction Mechanism | 1 | 0.35 | 2017 |
Degradation and encryption for outsourced PNG images in cloud storage. | 14 | 0.63 | 2016 |
New order preserving encryption model for outsourced databases in cloud environments | 38 | 1.09 | 2016 |
On modeling microscopic vehicle fuel consumption using radial basis function neural network | 0 | 0.34 | 2016 |
Verifiable searchable encryption with aggregate keys for data sharing in outsourcing storage | 2 | 0.37 | 2016 |
Cloud-based electronic health record system supporting fuzzy keyword search | 20 | 0.67 | 2016 |
DMSD-FPE - Data Masking System for Database Based on Format-Preserving Encryption. | 0 | 0.34 | 2016 |
Generalized Format-Preserving Encryption for Character Data. | 0 | 0.34 | 2016 |
Improved collaborative filtering with intensity-based contraction | 1 | 0.35 | 2015 |
Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud. | 1 | 0.35 | 2015 |
Service-oriented mobile malware detection system based on mining strategies | 4 | 0.39 | 2015 |
General Multi-key Searchable Encryption | 0 | 0.34 | 2015 |
A Secure Architecture for Data Storage in the Cloud Environments | 0 | 0.34 | 2015 |
Multi-key Searchable Encryption without Random Oracle | 2 | 0.37 | 2014 |
Privacy-preserving data utilization in hybrid clouds. | 13 | 0.69 | 2014 |
Tmds: Thin-Model Data Sharing Scheme Supporting Keyword Search In Cloud Storage | 12 | 0.65 | 2014 |
Enabling efficient and secure data sharing in cloud computing | 14 | 0.65 | 2014 |
{MobiShare}+: Security Improved System for Location Sharing in Mobile Online Social Networks. | 1 | 0.35 | 2014 |