Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
出版年份 2018 全文链接
标题
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
作者
关键词
Mobile social networks, Cloud computing, Privacy-preserving, Multiple keys
出版物
Cluster Computing-The Journal of Networks Software Tools and Applications
Volume -, Issue -, Pages -
出版商
Springer Nature
发表日期
2018-02-02
DOI
10.1007/s10586-017-1649-y
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Secure attribute-based data sharing for resource-limited users in cloud computing
- (2018) Jin Li et al. COMPUTERS & SECURITY
- Secure integration of IoT and Cloud Computing
- (2018) Christos Stergiou et al. Future Generation Computer Systems-The International Journal of eScience
- Reservoir Computing Meets Smart Grids: Attack Detection Using Delayed Feedback Networks
- (2018) Kian Hamedani et al. IEEE Transactions on Industrial Informatics
- Multi-key privacy-preserving deep learning in cloud computing
- (2017) Ping Li et al. Future Generation Computer Systems-The International Journal of eScience
- Big Data Meet Green Challenges: Greening Big Data
- (2016) Jinsong Wu et al. IEEE Systems Journal
- Big Data Meet Green Challenges: Big Data Toward Green Applications
- (2016) Jinsong Wu et al. IEEE Systems Journal
- An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys
- (2016) Ximeng Liu et al. IEEE Transactions on Information Forensics and Security
- Internet of surveillance: a cloud supported large-scale wireless surveillance system
- (2016) Mohammad A. Alsmirat et al. JOURNAL OF SUPERCOMPUTING
- Secure Distributed Deduplication Systems with Improved Reliability
- (2015) Jin Li et al. IEEE TRANSACTIONS ON COMPUTERS
- Exploring the Feasibility of Fully Homomorphic Encryption
- (2015) Wei Wang et al. IEEE TRANSACTIONS ON COMPUTERS
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- (2015) Jin Li et al. IEEE TRANSACTIONS ON COMPUTERS
- Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks
- (2015) Lan Zhang et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- A Hybrid Cloud Approach for Secure Authorized Deduplication
- (2015) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A secure data sharing and query processing framework via federation of cloud computing
- (2015) Bharath K. Samanthula et al. INFORMATION SYSTEMS
- Privacy Preserving Inner Product of Vectors in Cloud Computing
- (2014) Gang Sheng et al. International Journal of Distributed Sensor Networks
- Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking
- (2013) Rui Zhang et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Efficiently Outsourcing Multiparty Computation Under Multiple Keys
- (2013) Andreas Peter et al. IEEE Transactions on Information Forensics and Security
- Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
- (2013) Ming Li et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Security and privacy for storage and computation in cloud computing
- (2013) Lifei Wei et al. INFORMATION SCIENCES
- Computing arbitrary functions of encrypted data
- (2010) Craig Gentry COMMUNICATIONS OF THE ACM
- A view of cloud computing
- (2010) Michael Armbrust et al. COMMUNICATIONS OF THE ACM
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started