×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [32]
内容类型
期刊论文 [27]
会议论文 [5]
发表日期
2018 [12]
2017 [6]
2016 [2]
2015 [2]
2014 [2]
2012 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共32条,第1-10条
帮助
限定条件
专题:湖南大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries
期刊论文
IEEE/ACM Transactions on Networking, 2018, 卷号: Vol.26 No.2, 页码: 1018-1032
作者:
Jiang, HB
;
Zhao, P
;
Wang, C
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/26
Privacy
Servers
IEEE transactions
Robustness
Data privacy
Correlation
Indexes
Location privacy
k-anonymity
continuous LBS queries
location-dependent attacks
P-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization
期刊论文
IEEE/ACM Transactions on Networking, 2018, 卷号: Vol.26 No.6, 页码: 2856-2869
作者:
Ping Zhao
;
Hongbo Jiang
;
John C. S. Lui
;
Chen Wang
;
Fanzi Zeng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/26
Data privacy
Privacy
Databases
Servers
Estimation
IEEE transactions
Navigation
Privacy
indoor localization
k-anonymity
differential privacy
paradigm-driven
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE Internet of Things Journal, 2018, 卷号: Vol.5 No.5, 页码: 4191-4200
作者:
Shaobo Zhang
;
Guojun Wang
;
Zakirul Alam Bhuiyan
;
Qin Liu
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/26
Privacy
Trajectory
Servers
Computer architecture
Internet of Things
Collaboration
Computer science
K-anonymity
multiple anonymizers
query authentication
Shamir threshold
trajectory and content privacy
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 卷号: Vol.88, 页码: 491-500
作者:
Mahmood, Khalid
;
Li, Xiong
;
Chaudhry, Shehzad Ashraf
;
Naqvi, Husnain
;
Kumari, Saru
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/26
Smart grid
Authentication
Anonymity
Smart meter
Edge computing
ProVerif
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2018, 卷号: Vol.5 No.5, 页码: 4191-4200
作者:
Zhang, SB
;
Wang, GJ
;
Bhuiyan, MZA
;
Liu, Q
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
K-anonymity
multiple anonymizers
query authentication
Shamir threshold
trajectory and content privacy
P-3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization
期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 卷号: Vol.26 No.6, 页码: 2856-2869
作者:
Zhao, P
;
Jiang, HB
;
Lui, JCS
;
Wang, C
;
Zeng, FZ
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/26
Privacy
indoor localization
k-anonymity
differential privacy
paradigm-driven
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2018, 卷号: Vol.5 No.5, 页码: 4191-4200
作者:
Zhang, Shaobo
;
Wang, Guojun
;
Bhuiyan, Md Zakirul Alam
;
Liu, Qin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/26
K-anonymity
multiple anonymizers
query authentication
Shamir threshold
trajectory and content privacy
ILLIA: Enabling k-Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries
期刊论文
IEEE Internet of Things Journal, 2018, 卷号: Vol.5 No.2, 页码: 1033-1042
作者:
Zhao, P.
;
Li, J.
;
Zeng, F.
;
Xiao, F.
;
Wang, C.
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/26
Continuous
location-based
service
(LBS)
query
location
injection
attack
(LIA)
location
k-anonymity
location
privacy
mobility
similarity
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
期刊论文
Telecommunication Systems, 2018, 卷号: Vol.67 No.2, 页码: 323-348
作者:
Li, Xiong
;
Ibrahim, Maged Hamada
;
Kumari, Saru
;
Kumar, Rahul
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/26
WBAN
mHealth
Wearable sensors
Authentication
Anonymity
Key exchange
AVISPA
ILLIA: Enabling k-Anonymity-Based Privacy Preserving against Location Injection Attacks in Continuous LBS Queries
期刊论文
IEEE Internet of Things Journal, 2018, 卷号: Vol.5 No.2, 页码: 1033-1042
作者:
Zhao, P
;
Li, J
;
Zeng, FZ
;
Xiao, F
;
Wang, C
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/26
Privacy
Servers
Quality
of
service
Internet
of
Things
Electronic
mail
Aggregates
Mobile
communication
Location
privacy
location
k-anonymity
location
injection
attack
continuous
LBS
query
mobility
similarity.
©版权所有 ©2017 CSpace - Powered by
CSpace