Author:
Li Xuan,Li Jin,Yiu Siuming,Gao Chongzhi,Xiong Jinbo
Publisher
Springer Science and Business Media LLC
Subject
General Computer Science,Theoretical Computer Science
Reference47 articles.
1. Liu B, Li Y, Zeng B, Lei C. An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Frontiers of Computer Science, 2016, 10(3): 543–558
2. Chen X, Huang X, Li J, Ma J, Lou W, Wong D. New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Transactions on Information Forensics and Security, 2015, 10(1): 69–78
3. Shen J, Wang C, Li T, Chen X, Huang X, Zhan Z H. Secure data uploading scheme for a smart home system. Information Sciences, 2018, 453: 186–197
4. Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B. Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet of Things Journal, 2018
5. Wu D, Si S, Wu S, Wang R. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet of Things Journal, 2018, 5(4): 2958–2970
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献