Search Results - "IEEE transactions on dependable and secure computing"

Refine Results
  1. 1

    PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks by Zhang, Jing, Cui, Jie, Zhong, Hong, Chen, Zhili, Liu, Lu

    “…Existing security and identity-based vehicular communication protocols used in Vehicular Ad-hoc Networks (VANETs) to achieve conditional privacy-preserving…”
    Get full text
    Journal Article
  2. 2

    Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems by Li, Yannan, Yu, Yong, Min, Geyong, Susilo, Willy, Ni, Jianbing, Choo, Kim-Kwang Raymond

    “…Data integrity, a core security issue in reliable cloud storage, has received much attention. Data auditing protocols enable a verifier to efficiently check…”
    Get full text
    Journal Article
  3. 3

    MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention by Saracino, Andrea, Sgandurra, Daniele, Dini, Gianluca, Martinelli, Fabio

    “…Android users are constantly threatened by an increasing number of malicious applications (apps), generically called malware. Malware constitutes a serious…”
    Get full text
    Journal Article
  4. 4

    Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting by Miao, Yinbin, Liu, Ximeng, Choo, Kim-Kwang Raymond, Deng, Robert H., Li, Jiguo, Li, Hongwei, Ma, Jianfeng

    “…Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and supports fine-grained access control over encrypted data in the…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Searchable Symmetric Encryption with Forward Search Privacy by Li, Jin, Huang, Yanyu, Wei, Yu, Lv, Siyi, Liu, Zheli, Dong, Changyu, Lou, Wenjing

    “…Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries in practice. Although SSE is powerful and feature-rich, it…”
    Get full text
    Journal Article
  7. 7

    Trust-Based Service Management for Social Internet of Things Systems by Chen, Ing-Ray, Bao, Fenye, Guo, Jia

    “…A social internet of things (IoT) system can be viewed as a mix of traditional peer-to-peer networks and social networks, where "things" autonomously establish…”
    Get full text
    Journal Article
  8. 8

    A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing by Huang, Kai, Liu, Ximeng, Fu, Shaojing, Guo, Deke, Xu, Ming

    “…The proliferation of various mobile devices equipped with cameras results in an exponential growth of the amount of images. Recent advances in the deep…”
    Get full text
    Journal Article
  9. 9

    FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things by Zhang, Xiaojun, Xu, Chunxiang, Wang, Huaxiong, Zhang, Yuan, Wang, Shixiong

    “…Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide massive data storage services. To ensure the confidentiality,…”
    Get full text
    Journal Article
  10. 10

    Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA by Kravchik, Moshe, Shabtai, Asaf

    “…Industrial control systems (ICSs) are widely used and vital to industry and society. Their failure can have severe impact on both the economy and human life…”
    Get full text
    Journal Article
  11. 11

    Privacy-Preserving Federated Deep Learning With Irregular Users by Xu, Guowen, Li, Hongwei, Zhang, Yun, Xu, Shengmin, Ning, Jianting, Deng, Robert H.

    “…Federated deep learning has been widely used in various fields. To protect data privacy, many privacy-preservingapproaches have been designed and implemented…”
    Get full text
    Journal Article
  12. 12

    Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data by Miao, Yinbin, Deng, Robert H., Liu, Ximeng, Choo, Kim-Kwang Raymond, Wu, Hongjun, Li, Hongwei

    “…Searchable Encryption (SE) is an important technique to guarantee data security and usability in the cloud at the same time. Leveraging Ciphertext-Policy…”
    Get full text
    Journal Article
  13. 13

    Dependable Structural Health Monitoring Using Wireless Sensor Networks by Bhuiyan, Md Zakirul Alam, Guojun Wang, Jie Wu, Jiannong Cao, Xuefeng Liu, Tian Wang

    “…As an alternative to current wired-based networks, wireless sensor networks (WSNs) are becoming an increasingly compelling platform for engineering structural…”
    Get full text
    Journal Article
  14. 14

    Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability by Li, Yannan, Yang, Guomin, Susilo, Willy, Yu, Yong, Au, Man Ho, Liu, Dongxi

    “…Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection of…”
    Get full text
    Journal Article
  15. 15

    Robust and Universal Seamless Handover Authentication in 5G HetNets by Zhang, Yinghui, Deng, Robert H., Bertino, Elisa, Zheng, Dong

    “…The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous and backward-compatible networks. With the increased heterogeneity…”
    Get full text
    Journal Article
  16. 16

    Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers by Ximeng Liu, Choo, Kim-Kwang Raymond, Deng, Robert H., Rongxing Lu, Jian Weng

    “…In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR. Using POCR, a…”
    Get full text
    Journal Article
  17. 17

    Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency by Song, Xiangfu, Dong, Changyu, Yuan, Dandan, Xu, Qiuliang, Zhao, Minghao

    “…Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy,…”
    Get full text
    Journal Article
  18. 18

    Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing by Xu, Shengmin, Ning, Jianting, Li, Yingjiu, Zhang, Yinghui, Xu, Guowen, Huang, Xinyi, Deng, Robert H.

    “…Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to provide a variety of on-demand data services via the edge network…”
    Get full text
    Journal Article
  19. 19

    A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT by Li, Yannan, Susilo, Willy, Yang, Guomin, Yu, Yong, Liu, Dongxi, Du, Xiaojiang, Guizani, Mohsen

    “…The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia and industry in recent years. However, most of…”
    Get full text
    Journal Article
  20. 20

    Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks by Doshi, Keval, Yilmaz, Yasin, Uludag, Suleyman

    “…Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices…”
    Get full text
    Journal Article