An Efficient and Revocable Auditing Scheme for the Internet of Things

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SocialSec (6. : 2020 : Tientsin) Security and privacy in social networks and big data
1. Verfasser: Jun-Feng, Tian (VerfasserIn)
Weitere Verfasser: Rui-Fang, Guo (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Real-Time Audio and Video Streaming Transmission Scheme for Social Media 2020 Yu, Jianping
A Novel Measure to Quantify the Robustness of Social Network Under the Virus Attacks 2020 Song, Bo
An Efficient Framework for Text Document Security and Privacy 2020 Khadam, Umair
A Novel Web Anomaly Detection Approach Based on Semantic Structure 2020 Cheng, Zishuai
Adaptive Adversarial Attack on Graph Embedding via GAN 2020 Chen, Jinyin
A Methodology of Fake Cell Test Based on the RRC Redirection or Reselection Priorities from the 5G Network 2020 Zhang, Yanan
An Elastic Data Processing Method Based on Data-Center-Platform 2020 Pan, Zhang
Keeping Privacy Data Secure Under Factory Recovery 2020 Lianfang, Wang
Privacy-Preserving Nonlinear SVM Classifier Training Based on Blockchain 2020 Jia, Nan
Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies 2020 Peng, Hao
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions 2020 He, Yifei
Advertising Strategy for Maximizing Profit Using CrowdSensing Trajectory Data 2020 Lou, Kaihao
UAV-Enabled Social Internet of Vehicles: Roles, Security Issues and Use Cases 2020 Tang, Chaogang
An Efficient Influence Maximization Algorithm Based on Social Relationship Priority in Mobile Social Networks 2020 Zhang, Xinxin
Key Nodes Recognition in Opportunistic Network 2020 Wang, Zhifei
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm 2020 Zhang, Yunru
Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box Attacks 2020 Peng, Xiaowei
A Two-Fitness Resource Scheduling Strategy Based on Improved Particle Swarm Optimization 2020 Qiao, Xueming
Privacy-Preserving Graph Operations for Social Network Analysis 2020 Li, Peng
Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links 2020 Peng, Hao
Alle Artikel auflisten