A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks | 0 | 0.34 | 2022 |
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing | 4 | 0.37 | 2022 |
Secure Similarity Search Over Encrypted Non-Uniform Datasets | 0 | 0.34 | 2022 |
Dual Access Control for Cloud-Based Data Storage and Sharing | 2 | 0.36 | 2022 |
Efficient Attribute-Based Encryption With Repeated Attributes Optimization | 0 | 0.34 | 2021 |
Robust and Universal Seamless Handover Authentication in 5G HetNets | 2 | 0.35 | 2021 |
O-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System | 2 | 0.36 | 2021 |
Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things | 2 | 0.35 | 2021 |
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets | 0 | 0.34 | 2021 |
Flexible And Anonymous Network Slicing Selection For C-Ran Enabled 5g Service Authentication | 0 | 0.34 | 2021 |
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting | 0 | 0.34 | 2021 |
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing | 3 | 0.40 | 2021 |
Efficient Privacy-Preserving Authentication For V2g Networks | 0 | 0.34 | 2021 |
Secure and verifiable outsourced data dimension reduction on dynamic data | 0 | 0.34 | 2021 |
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-oriented Smart Health | 6 | 0.42 | 2020 |
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud | 2 | 0.38 | 2020 |
Attribute-based Encryption for Cloud Computing Access Control: A Survey | 3 | 0.36 | 2020 |
Revocable and certificateless public auditing for cloud storage | 0 | 0.34 | 2020 |
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems | 2 | 0.36 | 2020 |
LSAA: A Lightweight and Secure Access Authentication Scheme for both UEs and mMTC Devices in 5G Networks | 2 | 0.37 | 2020 |
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices. | 0 | 0.34 | 2020 |
Efficient ciphertext-policy attribute-based encryption with blackbox traceability | 1 | 0.35 | 2020 |
Comments on “A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing” | 0 | 0.34 | 2019 |
DABKE: Secure deniable attribute-based key exchange framework. | 0 | 0.34 | 2019 |
Certificateless Multi-Party Authenticated Encryption For Nb-Iot Terminals In 5g Networks | 1 | 0.36 | 2019 |
Sybsub: Privacy-Preserving Expressive Task Subscription With Sybil Detection In Crowdsourcing | 0 | 0.34 | 2019 |
Generic Construction Of Elgamal-Type Attribute-Based Encryption Schemes With Revocability And Dual-Policy | 0 | 0.34 | 2019 |
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. | 0 | 0.34 | 2019 |
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT | 3 | 0.39 | 2019 |
Secure attribute-based data sharing for resource-limited users in cloud computing. | 112 | 2.06 | 2018 |
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience. | 3 | 0.36 | 2018 |
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control. | 45 | 1.00 | 2018 |
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain. | 9 | 0.44 | 2018 |
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. | 3 | 0.37 | 2018 |
Efficient and secure big data storage system with leakage resilience in cloud computing. | 7 | 0.41 | 2018 |
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. | 19 | 0.88 | 2018 |
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. | 7 | 0.41 | 2018 |
SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing | 0 | 0.34 | 2018 |
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing. | 0 | 0.34 | 2018 |
Dual-side privacy-preserving task matching for spatial crowdsourcing. | 0 | 0.34 | 2018 |
Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things. | 0 | 0.34 | 2018 |
Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing. | 1 | 0.34 | 2018 |
Secure and fine-grained access control on e-healthcare records in mobile cloud computing. | 17 | 0.65 | 2018 |
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. | 2 | 0.38 | 2018 |
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing. | 1 | 0.35 | 2018 |
Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks. | 7 | 0.46 | 2017 |
Towards privacy protection and malicious behavior traceability in smart health. | 4 | 0.38 | 2017 |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. | 74 | 1.65 | 2017 |
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. | 2 | 0.36 | 2016 |
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. | 10 | 0.46 | 2016 |