BD3 |
A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context |
Big Data |
2023 |
BD5 |
A Trusted Approach for Decentralised and Privacy Preserving Identity Management |
Big Data |
2023 |
BD11 |
Pattern Mining and Detection of Malicious SQL Queries on Anonymization Mechanism |
Big Data |
2023 |
BD12 |
Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing |
Big Data |
2023 |
BD13 |
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure |
Big Data |
2023 |
BD14 |
Secure ABE Scheme for Access Management in Blockchain-Based IoT |
Big Data |
2023 |
BD15 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
Big Data |
2023 |
BD17 |
SOREL: Efficient and Secure ORE-based Range Query over Outsourced Data |
Big Data |
2023 |
CC1 |
A Robust Generic Multi Authority Attributes Management System for Cloud Storage Services |
Cloud Computing |
2023 |
CC2 |
A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing |
Cloud Computing |
2023 |
CC3 |
A Novel Revocable and Identity-Based Conditional Proxy Re Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing |
Cloud Computing |
2023 |
CC4 |
A Scalable and Efficient Multi Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud |
Cloud Computing |
2023 |
CC5 |
A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme |
Cloud Computing |
2023 |
CC6 |
ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map |
Cloud Computing |
2023 |
CC7 |
Accountable and Revocable Large Universe Decentralized Multi Authority Attribute-Based Encryption for Cloud-Aided IoT |
Cloud Computing |
2023 |
CC8 |
An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health |
Cloud Computing |
2023 |
CC9 |
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases |
Cloud Computing |
2023 |
CC10 |
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage |
Cloud Computing |
2023 |
CC11 |
Blockchain-Based Decentralized Public Auditing for Cloud Storage |
Cloud Computing |
2023 |
CC12 |
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors |
Cloud Computing |
2023 |
CC13 |
Dependable Data Outsourcing Scheme Based on Cloud-of Clouds Approach with Fast Recovery |
Cloud Computing |
2023 |
CC14 |
Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving |
Cloud Computing |
2023 |
CC15 |
Efficient Revocable Multi Authority Attribute-Based Encryption for Cloud Storage |
Cloud Computing |
2023 |
CC16 |
Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data |
Cloud Computing |
2023 |
CC17 |
Enabling Privacy-Assured Fog Based Data Aggregation in E Healthcare Systems |
Cloud Computing |
2023 |
CC18 |
Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing |
Cloud Computing |
2023 |
CC19 |
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption |
Cloud Computing |
2023 |
CC20 |
Lightweight and Privacy Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage |
Cloud Computing |
2023 |
CC21 |
Outsourced Decentralized Multi Authority Attribute Based Signature and Its Application in IoT |
Cloud Computing |
2023 |
CC22 |
Privacy Preserving Searchable Encryption with Fine-grained Access Control |
Cloud Computing |
2023 |
CC23 |
Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme |
Cloud Computing |
2023 |
CC24 |
Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment |
Cloud Computing |
2023 |
CC26 |
Secure Efficient Revocable Large Universe Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT |
Cloud Computing |
2023 |
CC27 |
Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption |
Cloud Computing |
2023 |
CC28 |
Securing Organizations Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption |
Cloud Computing |
2023 |
CC29 |
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud |
Cloud Computing |
2023 |
IOT1 |
A Privacy-aware and Traceable Fine-grained Data Delivery System in Cloud-assisted Healthcare |
IOT |
2023 |
IOT2 |
A Privacy-Preserving Optimization of neighbourhood Based Recommendation for Medical-Aided Diagnosis and Treatment |
IOT |
2023 |
IOT3 |
A Smart Contract Based Access Control Framework for Cloud Smart Healthcare System |
IOT |
2023 |
IOT5 |
Attribute-Based Secure Announcement Sharing among Vehicles Using Blockchain |
IOT |
2023 |
IOT6 |
Blockchain Aided Privacy Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices |
IOT |
2023 |
IOT7 |
Compiler-assisted Semantic aware Encryption for Efficient and Secure Serverless Computing |
IOT |
2023 |
IOT9 |
Efficient Data Access Control with Fine-Grained Data Protection in Cloud-Assisted IIoT |
IOT |
2023 |
IOT10 |
Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things |
IOT |
2023 |
IOT12 |
Lightweight Privacy-Preserving Scheme using Homomorphic Encryption in Industrial Internet of Things |
IOT |
2023 |
IOT13 |
Lightweight Searchable Encryption Protocol for Industrial Internet of Things |
IOT |
2023 |
IOT14 |
Novel Strong-PUF-based Authentication Protocols Leveraging Shamirs Secret Sharing |
IOT |
2023 |
IOT15 |
Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs |
IOT |
2023 |
IOT16 |
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing |
IOT |
2023 |
IOT17 |
Secure and Lightweight Fine grained Searchable Data Sharing for IoT-oriented and Cloud assisted Smart Healthcare System |
IOT |
2023 |
IOT19 |
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors |
IOT |
2023 |
IOT20 |
Secure and Verifiable Multi-key Image Search in Cloud-Assisted Edge Computing |
IOT |
2023 |
IOT21 |
Selective Sharing of Outsourced Encrypted Data in Cloud Environments. |
IOT |
2023 |
IOT22 |
Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud |
IOT |
2023 |
IOT23 |
Towards Verifiable Phrase Search over Encrypted Cloud-Based IoT Data |
IOT |
2023 |
IOT24 |
Verifiable Multi-keyword Search Encryption Scheme with Anonymous Key Generation for Medical Internet of Things |
IOT |
2023 |
MC1 |
Privacy-Preserving Multi Keyword Searchable Encryption for Distributed Systems |
Mobile Computing |
2023 |
MC2 |
Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value |
Mobile Computing |
2023 |
MC3 |
Lightweight Public Key Authenticated Encryption with Keyword Search against Adaptively-Chosen-Targets Adversaries for Mobile Devices |
Mobile Computing |
2023 |
MC4 |
Anonymous authenticated key agreement and group proof protocol for wearable computing |
Mobile Computing |
2023 |
MC5 |
Privacy-preserving Streaming Truth Discovery in Crowdsourcing with Differential Privacy |
Mobile Computing |
2023 |
SC1 |
Achieving Efficient and Privacy Preserving Set Containment Search over Encrypted Data |
Service Computing |
2023 |
SC2 |
Certificateless public integrity checking of group shared data on cloud storage |
Service Computing |
2023 |
SC3 |
Blockchain based Multi-Authority Fine-Grained Access Control System with Flexible Revocation |
Service Computing |
2023 |
SC4 |
Efficient and Anonymous Authentication for Healthcare Service with Cloud based WBANs |
Service Computing |
2023 |
SC6 |
Fair Outsourcing Polynomial Computation Based on the Blockchain |
Service Computing |
2023 |
SC7 |
Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage |
Service Computing |
2023 |
SC8 |
Indirect Revocable KP-ABE with Revocation Undoing Resistance |
Service Computing |
2023 |
SC9 |
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control |
Service Computing |
2023 |
SC11 |
Privacy-Preserving Task Recommendation Services for Crowdsourcing |
Service Computing |
2023 |
SC12 |
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud |
Service Computing |
2023 |
SC13 |
Secure Outsourced Attribute based Sharing Framework for Lightweight Devices in Smart Health Systems |
Service Computing |
2023 |
SC14 |
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage |
Service Computing |
2023 |
SC15 |
Semantic-based Compound Keyword Search over Encrypted Cloud Data |
Service Computing |
2023 |
SC16 |
Towards Multi-client Forward Private Searchable Symmetric Encryption in Cloud Computing |
Service Computing |
2023 |
PDC2 |
A privacy-preserving framework for outsourcing location-based services to the cloud |
Dependable and secure computing |
2023 |
PDC3 |
A Verifiable and Fair Attribute based Proxy Re-encryption Scheme for Data Sharing in |
Dependable and secure computing |
2023 |
PDC4 |
Accountable Proxy Re-Encryption for Secure Data Sharing |
Dependable and secure computing |
2023 |
PDC5 |
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing |
Dependable and secure computing |
2023 |
PDC6 |
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption |
Dependable and secure computing |
2023 |
PDC7 |
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword with Sensitive Information Privacy for Encrypted Cloud Data |
Dependable and secure computing |
2023 |
PDC8 |
Collusion Defender: Preserving Subscribers Privacy in Publish and Subscribe Systems |
Dependable and secure computing |
2023 |
PDC9 |
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
Dependable and secure computing |
2023 |
PDC10 |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Dependable and secure computing |
2023 |
PDC11 |
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services |
Dependable and secure computing |
2023 |
PDC12 |
Efficient and Privacy-Preserving Similarity Range Query over Encrypted Time Series |
Dependable and secure computing |
2023 |
PDC13 |
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy |
Dependable and secure computing |
2023 |
PDC14 |
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data |
Dependable and secure computing |
2023 |
PDC16 |
Fully Accountable Data Sharing for Pay-As-You-Go Cloud Scenes |
Dependable and secure computing |
2023 |
PDC17 |
Multi-client Cloud-based Symmetric Searchable Encryption |
Dependable and secure computing |
2023 |
PDC18 |
Optimized Verifiable Fine Grained Keyword Search in Dynamic Multi-owner Settings |
Dependable and secure computing |
2023 |
PDC20 |
Policy-based Broadcast Access Authorization for Flexible Data Sharing in Clouds |
Dependable and secure computing |
2023 |
PDC21 |
Privacy-Preserving Attribute Based Keyword Search in Shared Multi-owner Setting |
Dependable and secure computing |
2023 |
PDC22 |
Privacy-Preserving Distributed Data Access Control for CloudIoT |
Dependable and secure computing |
2023 |
PDC23 |
PVOPM: Verifiable Privacy preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting |
Dependable and secure computing |
2023 |
PDC24 |
Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds |
Dependable and secure computing |
2023 |
PDC25 |
Searchable Symmetric Encryption with Forward Search Privacy |
Dependable and secure computing |
2023 |
PDC26 |
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System |
Dependable and secure computing |
2023 |
PDC27 |
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems |
Dependable and secure computing |
2023 |
PDC28 |
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification |
Dependable and secure computing |
2023 |
BC1 |
A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain |
Blockchain |
2023 |
BC2 |
A Transparent and Privacy Preserving Healthcare Platform With Novel Smart Contract for Smart Cities |
Blockchain |
2023 |
BC3 |
A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products |
Blockchain |
2023 |
BC4 |
Automating Procurement Contracts in the Healthcare Supply Chain Using Blockchain Smart Contracts |
Blockchain |
2023 |
BC5 |
Blockchain-Based Forward Supply Chain and Waste Management for COVID-19 Medical Equipment and Supplies |
Blockchain |
2023 |
BC6 |
Blockchain-Based Solution for Distribution and Delivery of COVID-19 Vaccines |
Blockchain |
2023 |
BC7 |
Blockchains for COVID-19 Contact Tracing and Vaccine Support: A Systematic Review |
Blockchain |
2023 |
BC8 |
Data Trading Certification Based on Consortium Blockchain and Smart Contracts |
Blockchain |
2023 |
BC9 |
Efficient and Secure Blockchain System for Digital Content Trading |
Blockchain |
2023 |
BC10 |
On the Design and Implementation of a Blockchain Enabled E-Voting Application Within IoT-Oriented Smart Cities |
Blockchain |
2023 |
BC11 |
PABC: A Patent Application System Based on Blockchain |
Blockchain |
2023 |
BC12 |
Authentication and Key Management in Distributed IoT using Blockchain Technology |
Blockchain |
2023 |
BC13 |
Practical Medical Files Sharing Scheme Based on Blockchain and Decentralized Attribute-Based Encryption |
Blockchain |
2023 |
BC14 |
Secure ABE Scheme for Access Management in Blockchain-Based IoT |
Blockchain |
2023 |
BC15 |
Smart Contract-Based Agricultural Food Supply Chain Traceability |
Blockchain |
2023 |
BC16 |
TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain |
Blockchain |
2023 |
BC17 |
The Notarial Office in E government: A Blockchain-Based Solution |
Blockchain |
2023 |
NS1 |
A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography |
Network Security |
2023 |
NS2 |
A Simple and Secure Reformation-Based Password Scheme |
Network Security |
2023 |
NS3 |
An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network |
Network Security |
2023 |
NS4 |
Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation |
Network Security |
2023 |
NS5 |
An Unlinkable Authenticated Key Agreement with Collusion Resistant for VANETs |
Network Security |
2023 |
NS6 |
Lightweight Authentication Protocol Using Self-Certified Public Keys for Wireless Body Area Networks in Health-Care Applications |
Network Security |
2023 |
NS7 |
Online Student Authentication and Proctoring System Based on Multimodal Biometrics Technology |
Network Security |
2023 |
NS8 |
Provable Privacy Preserving Authentication Solution for Internet of Things Environment |
Network Security |
2023 |
NS9 |
Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids |
Network Security |
2023 |
NS10 |
Secure ABE Scheme for Access Management in Blockchain-Based IoT |
Network Security |
2023 |
NS11 |
Secure Fully Homomorphic Authenticated Encryption |
Network Security |
2023 |
BD3 |
A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context |
Big Data |
JAVA/2021 |
BD4 |
A Novel Similar Player Clustering Method With Privacy Preservation for Sport Performance Evaluation in Cloud |
Big Data |
JAVA/2021 |
BD5 |
A Trusted Approach for Decentralised and Privacy Preserving Identity Management |
Big Data |
JAVA/2021 |
BD11 |
Pattern Mining and Detection of Malicious SQL Queries on Anonymization Mechanism |
Big Data |
JAVA/2021 |
BD12 |
Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing |
Big Data |
JAVA/2021 |
BD13 |
Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure |
Big Data |
JAVA/2021 |
BD14 |
Secure ABE Scheme for Access Management in Blockchain-Based IoT |
Big Data |
JAVA/2021 |
BD15 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
Big Data |
JAVA/2021 |
BD17 |
SOREL: Efficient and Secure ORE-based Range Query over Outsourced Data |
Big Data |
JAVA/2021 |
BD8 |
AttractRank: District Attraction Ranking Analysis Based on Taxi Big Data |
Big Data |
JAVA/2021 |
CC1 |
A Robust Generic Multi Authority Attributes Management System for Cloud Storage Services |
Cloud Computing |
JAVA/2021 |
CC2 |
A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing |
Cloud Computing |
JAVA/2021 |
CC3 |
A Novel Revocable and Identity-Based Conditional Proxy Re Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing |
Cloud Computing |
JAVA/2021 |
CC4 |
A Scalable and Efficient Multi Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud |
Cloud Computing |
JAVA/2021 |
CC5 |
A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme |
Cloud Computing |
JAVA/2021 |
CC6 |
ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map |
Cloud Computing |
JAVA/2021 |
CC7 |
Accountable and Revocable Large Universe Decentralized Multi Authority Attribute-Based Encryption for Cloud-Aided IoT |
Cloud Computing |
JAVA/2021 |
CC8 |
An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health |
Cloud Computing |
JAVA/2021 |
CC9 |
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases |
Cloud Computing |
JAVA/2021 |
CC10 |
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage |
Cloud Computing |
JAVA/2021 |
CC11 |
Blockchain-Based Decentralized Public Auditing for Cloud Storage |
Cloud Computing |
JAVA/2021 |
CC12 |
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors |
Cloud Computing |
JAVA/2021 |
CC13 |
Dependable Data Outsourcing Scheme Based on Cloud-of Clouds Approach with Fast Recovery |
Cloud Computing |
JAVA/2021 |
CC14 |
Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving |
Cloud Computing |
JAVA/2021 |
CC15 |
Efficient Revocable Multi Authority Attribute-Based Encryption for Cloud Storage |
Cloud Computing |
JAVA/2021 |
CC16 |
Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data |
Cloud Computing |
JAVA/2021 |
CC17 |
Enabling Privacy-Assured Fog Based Data Aggregation in E Healthcare Systems |
Cloud Computing |
JAVA/2021 |
CC18 |
Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing |
Cloud Computing |
JAVA/2021 |
CC19 |
KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption |
Cloud Computing |
JAVA/2021 |
CC20 |
Lightweight and Privacy Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage |
Cloud Computing |
JAVA/2021 |
CC21 |
Outsourced Decentralized Multi Authority Attribute Based Signature and Its Application in IoT |
Cloud Computing |
JAVA/2021 |
CC22 |
Privacy Preserving Searchable Encryption with Fine-grained Access Control |
Cloud Computing |
JAVA/2021 |
CC23 |
Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme |
Cloud Computing |
JAVA/2021 |
CC24 |
Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment |
Cloud Computing |
JAVA/2021 |
CC26 |
Secure Efficient Revocable Large Universe Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT |
Cloud Computing |
JAVA/2021 |
CC27 |
Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption |
Cloud Computing |
JAVA/2021 |
CC28 |
Securing Organizations Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption |
Cloud Computing |
JAVA/2021 |
CC29 |
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud |
Cloud Computing |
JAVA/2021 |
DM5 |
An Efficient Association Rule Mining From Distributed Medical Databases for Predicting Heart Diseases |
Data mining |
JAVA/2021 |
DM12 |
Improving the Quality of Web based Data Imputation with Crowd Intervention |
Data mining |
JAVA/2021 |
DM16 |
Privacy-Preserving Mechanism in Smart Home Using Blockchain |
Data mining |
JAVA/2021 |
IOT1 |
A Privacy-aware and Traceable Fine-grained Data Delivery System in Cloud-assisted Healthcare |
IOT |
JAVA/2021 |
IOT2 |
A Privacy-Preserving Optimization of neighbourhood Based Recommendation for Medical-Aided Diagnosis and Treatment |
IOT |
JAVA/2021 |
IOT3 |
A Smart Contract Based Access Control Framework for Cloud Smart Healthcare System |
IOT |
JAVA/2021 |
IOT5 |
Attribute-Based Secure Announcement Sharing among Vehicles Using Blockchain |
IOT |
JAVA/2021 |
IOT6 |
Blockchain Aided Privacy Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices |
IOT |
JAVA/2021 |
IOT7 |
Compiler-assisted Semantic aware Encryption for Efficient and Secure Serverless Computing |
IOT |
JAVA/2021 |
IOT9 |
Efficient Data Access Control with Fine-Grained Data Protection in Cloud-Assisted IIoT |
IOT |
JAVA/2021 |
IOT10 |
Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things |
IOT |
JAVA/2021 |
IOT11 |
Fast and Secure Location-based Services in Smart Cities on Outsourced Data |
IOT |
JAVA/2021 |
IOT12 |
Lightweight Privacy-Preserving Scheme using Homomorphic Encryption in Industrial Internet of Things |
IOT |
JAVA/2021 |
IOT13 |
Lightweight Searchable Encryption Protocol for Industrial Internet of Things |
IOT |
JAVA/2021 |
IOT14 |
Novel Strong-PUF-based Authentication Protocols Leveraging Shamirs Secret Sharing |
IOT |
JAVA/2021 |
IOT15 |
Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs |
IOT |
JAVA/2021 |
IOT16 |
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing |
IOT |
JAVA/2021 |
IOT17 |
Secure and Lightweight Fine grained Searchable Data Sharing for IoT-oriented and Cloud assisted Smart Healthcare System |
IOT |
JAVA/2021 |
IOT19 |
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors |
IOT |
JAVA/2021 |
IOT20 |
Secure and Verifiable Multi-key Image Search in Cloud-Assisted Edge Computing |
IOT |
JAVA/2021 |
IOT21 |
Selective Sharing of Outsourced Encrypted Data in Cloud Environments. |
IOT |
JAVA/2021 |
IOT22 |
Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud |
IOT |
JAVA/2021 |
IOT23 |
Towards Verifiable Phrase Search over Encrypted Cloud-Based IoT Data |
IOT |
JAVA/2021 |
IOT24 |
Verifiable Multi-keyword Search Encryption Scheme with Anonymous Key Generation for Medical Internet of Things |
IOT |
JAVA/2021 |
MC1 |
Privacy-Preserving Multi Keyword Searchable Encryption for Distributed Systems |
Mobile Computing |
JAVA/2021 |
MC2 |
Privacy-Preserving Similarity Search With Efficient Updates in Distributed Key-Value |
Mobile Computing |
JAVA/2021 |
MC3 |
Lightweight Public Key Authenticated Encryption with Keyword Search against Adaptively-Chosen-Targets Adversaries for Mobile Devices |
Mobile Computing |
JAVA/2021 |
MC4 |
Anonymous authenticated key agreement and group proof protocol for wearable computing |
Mobile Computing |
JAVA/2021 |
MC5 |
Privacy-preserving Streaming Truth Discovery in Crowdsourcing with Differential Privacy |
Mobile Computing |
JAVA/2021 |
SC1 |
Achieving Efficient and Privacy Preserving Set Containment Search over Encrypted Data |
Service Computing |
JAVA/2021 |
SC2 |
Certificateless public integrity checking of group shared data on cloud storage |
Service Computing |
JAVA/2021 |
SC3 |
Blockchain based Multi-Authority Fine-Grained Access Control System with Flexible Revocation |
Service Computing |
JAVA/2021 |
SC4 |
Efficient and Anonymous Authentication for Healthcare Service with Cloud based WBANs |
Service Computing |
JAVA/2021 |
SC5 |
Efficient Privacy-Preserving Similarity Range Query with Quadsector Tree in eHealthcare |
Service Computing |
JAVA/2021 |
SC6 |
Fair Outsourcing Polynomial Computation Based on the Blockchain |
Service Computing |
JAVA/2021 |
SC7 |
Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage |
Service Computing |
JAVA/2021 |
SC8 |
Indirect Revocable KP-ABE with Revocation Undoing Resistance |
Service Computing |
JAVA/2021 |
SC9 |
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control |
Service Computing |
JAVA/2021 |
SC10 |
Privacy-Preserving Spatio Temporal Keyword Search for Outsourced Location-Based Services |
Service Computing |
JAVA/2021 |
SC11 |
Privacy-Preserving Task Recommendation Services for Crowdsourcing |
Service Computing |
JAVA/2021 |
SC12 |
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud |
Service Computing |
JAVA/2021 |
SC13 |
Secure Outsourced Attribute based Sharing Framework for Lightweight Devices in Smart Health Systems |
Service Computing |
JAVA/2021 |
SC14 |
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage |
Service Computing |
JAVA/2021 |
SC15 |
Semantic-based Compound Keyword Search over Encrypted Cloud Data |
Service Computing |
JAVA/2021 |
SC16 |
Towards Multi-client Forward Private Searchable Symmetric Encryption in Cloud Computing |
Service Computing |
JAVA/2021 |
SC17 |
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-owner Multi-user Settings |
Service Computing |
JAVA/2021 |
PDC2 |
A privacy-preserving framework for outsourcing location-based services to the cloud |
Dependable and secure computing |
JAVA/2021 |
PDC3 |
A Verifiable and Fair Attribute based Proxy Re-encryption Scheme for Data Sharing in |
Dependable and secure computing |
JAVA/2021 |
PDC4 |
Accountable Proxy Re-Encryption for Secure Data Sharing |
Dependable and secure computing |
JAVA/2021 |
PDC5 |
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing |
Dependable and secure computing |
JAVA/2021 |
PDC6 |
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption |
Dependable and secure computing |
JAVA/2021 |
PDC7 |
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword with Sensitive Information Privacy for Encrypted Cloud Data |
Dependable and secure computing |
JAVA/2021 |
PDC8 |
Collusion Defender: Preserving Subscribers Privacy in Publish and Subscribe Systems |
Dependable and secure computing |
JAVA/2021 |
PDC9 |
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
Dependable and secure computing |
JAVA/2021 |
PDC10 |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Dependable and secure computing |
JAVA/2021 |
PDC11 |
Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services |
Dependable and secure |
JAVA/2021 |
PDC12 |
Efficient and Privacy-Preserving Similarity Range Query over Encrypted Time Series |
Dependable and secure computing |
JAVA/2021 |
PDC13 |
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy |
Dependable and secure computing |
JAVA/2021 |
PDC14 |
Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data |
Dependable and secure computing |
JAVA/2021 |
PDC16 |
Fully Accountable Data Sharing for Pay-As-You-Go Cloud Scenes |
Dependable and secure computing |
JAVA/2021 |
PDC17 |
Multi-client Cloud-based Symmetric Searchable Encryption |
Dependable and secure computing |
JAVA/2021 |
PDC18 |
Optimized Verifiable Fine Grained Keyword Search in Dynamic Multi-owner Settings |
Dependable and secure computing |
JAVA/2021 |
PDC20 |
Policy-based Broadcast Access Authorization for Flexible Data Sharing in Clouds |
Dependable and secure computing |
JAVA/2021 |
PDC21 |
Privacy-Preserving Attribute Based Keyword Search in Shared Multi-owner Setting |
Dependable and secure computing |
JAVA/2021 |
PDC22 |
Privacy-Preserving Distributed Data Access Control for CloudIoT |
Dependable and secure computing |
JAVA/2021 |
PDC23 |
PVOPM: Verifiable Privacy preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting |
Dependable and secure computing |
JAVA/2021 |
PDC24 |
Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds |
Dependable and secure computing |
JAVA/2021 |
PDC25 |
Searchable Symmetric Encryption with Forward Search Privacy |
Dependable and secure computing |
JAVA/2021 |
PDC26 |
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System |
Dependable and secure computing |
JAVA/2021 |
PDC27 |
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems |
Dependable and secure computing |
JAVA/2021 |
PDC28 |
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification |
Dependable and secure computing |
JAVA/2021 |
BC1 |
A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain |
Blockchain |
JAVA/2021 |
BC2 |
A Transparent and Privacy Preserving Healthcare Platform With Novel Smart Contract for Smart Cities |
Blockchain |
JAVA/2021 |
BC3 |
A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products |
Blockchain |
JAVA/2021 |
BC4 |
Automating Procurement Contracts in the Healthcare Supply Chain Using Blockchain Smart Contracts |
Blockchain |
JAVA/2021 |
BC5 |
Blockchain-Based Forward Supply Chain and Waste Management for COVID-19 Medical Equipment and Supplies |
Blockchain |
JAVA/2021 |
BC6 |
Blockchain-Based Solution for Distribution and Delivery of COVID-19 Vaccines |
Blockchain |
JAVA/2021 |
BC7 |
Blockchains for COVID-19 Contact Tracing and Vaccine Support: A Systematic Review |
Blockchain |
JAVA/2021 |
BC8 |
Data Trading Certification Based on Consortium Blockchain and Smart Contracts |
Blockchain |
JAVA/2021 |
BC9 |
Efficient and Secure Blockchain System for Digital Content Trading |
Blockchain |
JAVA/2021 |
BC10 |
On the Design and Implementation of a Blockchain Enabled E-Voting Application Within IoT-Oriented Smart Cities |
Blockchain |
JAVA/2021 |
BC11 |
PABC: A Patent Application System Based on Blockchain |
Blockchain |
JAVA/2021 |
BC12 |
Authentication and Key Management in Distributed IoT using Blockchain Technology |
Blockchain |
JAVA/2021 |
BC13 |
Practical Medical Files Sharing Scheme Based on Blockchain and Decentralized Attribute-Based Encryption |
Blockchain |
JAVA/2021 |
BC14 |
Secure ABE Scheme for Access Management in Blockchain-Based IoT |
Blockchain |
JAVA/2021 |
BC15 |
Smart Contract-Based Agricultural Food Supply Chain Traceability |
Blockchain |
JAVA/2021 |
BC16 |
TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain |
Blockchain |
JAVA/2021 |
BC17 |
The Notarial Office in E government: A Blockchain-Based Solution |
Blockchain |
JAVA/2021 |
NS1 |
A Lightweight Authentication With Privacy-Preserving Scheme for Vehicular Ad Hoc Networks Based on Elliptic Curve Cryptography |
Network Security |
JAVA/2021 |
NS2 |
A Simple and Secure Reformation-Based Password Scheme |
Network Security |
JAVA/2021 |
NS3 |
An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network |
Network Security |
JAVA/2021 |
NS4 |
Efficient Short Group Signatures for Conditional Privacy in Vehicular Ad Hoc Networks via ID Caching and Timed Revocation |
Network Security |
JAVA/2021 |
NS5 |
An Unlinkable Authenticated Key Agreement with Collusion Resistant for VANETs |
Network Security |
JAVA/2021 |
NS6 |
Lightweight Authentication Protocol Using Self-Certified Public Keys for Wireless Body Area Networks in Health-Care Applications |
Network Security |
JAVA/2021 |
NS7 |
Online Student Authentication and Proctoring System Based on Multimodal Biometrics Technology |
Network Security |
JAVA/2021 |
NS8 |
Provable Privacy Preserving Authentication Solution for Internet of Things Environment |
Network Security |
JAVA/2021 |
NS9 |
Quantum-Resistant Lightweight Authentication and Key Agreement Protocol for Fog-Based Microgrids |
Network Security |
JAVA/2021 |
NS10 |
Secure ABE Scheme for Access Management in Blockchain-Based IoT |
Network Security |
JAVA/2021 |
NS11 |
Secure Fully Homomorphic Authenticated Encryption |
Network Security |
JAVA/2021 |
JN2 |
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices |
NETWORK |
JAVA/2021 |
JN3 |
Research on the Link Prediction Model of Dynamic Multiplex Social Network Based on Improved Graph Representation Learning |
NETWORK |
JAVA/2021 |