1 |
AGARWAL K, JHA A K. Intelligence and Internet of Things with 5G technology: application and development[C]//Proceedings of International Conference on Electronics and Renewable Systems. Washington D. C., USA: IEEE Press, 2022: 762-766.
|
2 |
丁庆丰, 李晋国. 一种物联网环境下的分布式异常流量检测方案. 计算机工程, 2022, 48 (8): 152- 159.
URL
|
|
DING Q F, LI J G. A distributed abnormal traffic detection scheme in Internet of Things environment. Computer Engineering, 2022, 48 (8): 152- 159.
URL
|
3 |
谢娜, 谭文安, 曹彦, 等. 移动边缘计算中安全信息流建模与分析. 计算机工程, 2022, 48 (5): 35-42, 52.
doi: 10.19678/j.issn.1000-3428.0062953
|
|
XIE N, TAN W A, CAO Y, et al. Modeling and analysis of security information flow in mobile edge computing. Computer Engineering, 2022, 48 (5): 35-42, 52.
doi: 10.19678/j.issn.1000-3428.0062953
|
4 |
MCENROE P, WANG S, LIYANAGE M. A survey on the convergence of edge computing and AI for UAVs: opportunities and challenges. IEEE Internet of Things Journal, 2022, 9 (17): 15435- 15459.
doi: 10.1109/JIOT.2022.3176400
|
5 |
GONG F H. Design of distributed network mass data processing system based on cloud computing technology[C]//Proceedings of the 5th International Conference on I-SMAC(IoT in Social, Mobile, Analytics and Cloud). Washington D. C., USA: IEEE Press, 2021: 1218-1221.
|
6 |
SRIRAM G S. Edge computing vs. cloud computing: an overview of big data challenges and opportunities for large enterprises. International Research Journal of Modernization in Engineering Technology and Science, 2022, 4 (1): 1331- 1337.
|
7 |
CHANG L Y, ZHANG Z, LI P, et al. 6G-enabled edge AI for metaverse: challenges, methods, and future research directions. Journal of Communications and Information Networks, 2022, 7 (2): 107- 121.
doi: 10.23919/JCIN.2022.9815195
|
8 |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2002: 44-55.
|
9 |
MIAO Y B, MA J F, LIU X M, et al. Attribute-based keyword search over hierarchical data in cloud computing. IEEE Transactions on Services Computing, 2020, 13 (6): 985- 998.
|
10 |
LI X H, TONG Q Y, ZHAO J W, et al. VRFMS: verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Transactions on Services Computing, 2023, 16 (1): 698- 710.
|
11 |
闫玺玺, 赵强, 汤永利, 等. 支持灵活访问控制的多关键字搜索加密方案. 西安电子科技大学学报, 2022, 49 (1): 55- 66.
URL
|
|
YAN X X, ZHAO Q, TANG Y L, et al. Multi-keyword search encryption scheme supporting flexible access control. Journal of Xidian University, 2022, 49 (1): 55- 66.
URL
|
12 |
SUN J, REN L L, WANG S P, et al. Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage. IEEE Access, 2019, 7, 66655- 66667.
doi: 10.1109/ACCESS.2019.2917772
|
13 |
NIU S F, CHEN L X, WANG J F, et al. Electronic health record sharing scheme with searchable attribute-based encryption on blockchain. IEEE Access, 2019, 8, 7195- 7204.
|
14 |
SU J, ZHANG L Y, MU Y. BA-RMKABSE: blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system. Future Generation Computer Systems, 2022, 132, 299- 309.
doi: 10.1016/j.future.2022.01.021
|
15 |
WU Y L, LI X Y, LIU Z. Attribute-based keyword searchable encryption scheme for multi-authority in cloud storage[C]//Proceedings of the 22nd International Conference on Communication Technology. Washington D. C., USA: IEEE Press, 2023: 933-939.
|
16 |
SUN Y Q, HAN L D, BI J G, et al. Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud. Journal of Cloud Computing, 2023, 12 (1): 1- 13.
|
17 |
VARRI U S, PASUPULETI S K, KADAMBARI K V. Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (9): 11455- 11467.
|
18 |
MAMTA, GUPTA B B. An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud. Concurrency and Computation: Practice and Experience, 2020, 32 (18): e5291.
|
19 |
ZIEGLER D, MARSALEK A, PALFINGER G. White-box traceable attribute-based encryption with hidden policies and outsourced decryption[C]//Proceedings of the 20th International Conference on Trust, Security and Privacy in Computing and Communications. Washington D. C., USA: IEEE Press, 2021: 331-338.
|
20 |
LING J T, GU H X, WANG H J, et al. An efficient ciphertext index retrieval scheme based on edge computing framework. IEEE Access, 2021, 9, 37975- 37988.
|
21 |
TAN X D, CHENG W, HUANG H P, et al. Edge-aided searchable data sharing scheme for IoV in the 5G environment. Journal of Systems Architecture, 2023, 136, 102834.
|
22 |
DEEBAK B D, MEMON F H, DEV K, et al. AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT. Ad Hoc Networks, 2022, 125, 102740.
|
23 |
陈虹, 侯宇婷, 郭鹏飞, 等. 可公开验证的高效无证书聚合签密方案. 计算机工程, 2022, 48 (10): 146- 157.
URL
|
|
CHEN H, HOU Y T, GUO P F, et al. Efficient certificateless aggregate signcryption scheme with public verification. Computer Engineering, 2022, 48 (10): 146- 157.
URL
|
24 |
MAMTA, GUPTA B B, LI K C, et al. Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA Journal of Automatica Sinica, 2021, 8 (12): 1877- 1890.
|
25 |
YANG X H, ZHANG C S. Blockchain-based multiple authorities attribute-based encryption for EHR access control scheme. Applied Sciences, 2022, 12 (21): 10812.
|
26 |
|