1 |
黄静. 物联网综述. 北京财贸职业学院学报, 2016, 32 (6): 21- 26.
doi: 10.3969/j.issn.1974-2923.2016.06.005
|
|
HUANG J . Overview of the Internet of Things. Journal of Beijing College of Finance and Commerce, 2016, 32 (6): 21- 26.
doi: 10.3969/j.issn.1974-2923.2016.06.005
|
2 |
施鑫垚, 王静宇, 刘立新. 物联网环境下分布式的隐私保护数据聚合方案. 小型微型计算机系统, 2024, 45 (8): 2026- 2033.
|
|
SHI X Y , WANG J Y , LIU L X . Distributed privacy protection data aggregation scheme in the Internet of Things environment. Journal of Chinese Computer Systems, 2024, 45 (8): 2026- 2033.
|
3 |
MAHMOOD M , KHAN M I , ZIAUDDIN , et al. Improving security architecture of Internet of medical things: a systematic literature review. IEEE Access, 2023, 11, 107725- 107753.
|
4 |
ZIDI C M , SONDI P , MITTON N , et al. Review and perspectives on the audit of vehicle-to-everything communications. IEEE Access, 2023, 11, 81623- 81645.
|
5 |
JE S M , WOO H , CHOI J , et al. A research trend on anonymous signature and authentication methods for privacy invasion preventability on smart grid and power plant environments. Energies, 2022, 15 (12): 1- 20.
|
6 |
TANG Z H . Secret sharing-based IoT text data outsourcing: a secure and efficient scheme. IEEE Access, 2021, 9, 76908- 76920.
|
7 |
SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//Proceeding of 2000 IEEE Symposium on Security and Privacy. Washington D.C., USA: IEEE Press, 2000: 44-55.
|
8 |
BONEH D, DI CRESCENZO G, OSTROVSKY R, et al. Public key encryption with keyword search[C]//Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques. Washington D.C., USA: IEEE Press, 2004: 506-522.
|
9 |
WU L B , CHEN B W , ZEADALLY S , et al. An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Computing, 2018, 22 (23): 7685- 7696.
|
10 |
HAN L D , GUO J L , YANG G , et al. An efficient and secure public key authenticated encryption with keyword search in the logarithmic time. IEEE Access, 2021, 9, 151245- 151253.
|
11 |
GOH E J . Secure indexes. IACR Cryptol. ePrint Arch, 2003, 8042 (216): 353- 373.
|
12 |
BAO F, DENG R H, DING X H, et al. Private query on encrypted data in multi-user settings[C]//Proceedings of International Conference on Information Security Practice and Experience. Berlin, Germany: Springer, 2008: 71-85.
|
13 |
FENG T , SI J W . Certificateless searchable encryption scheme in multi-user environment. Cryptography, 2022, 6 (4): 61.
|
14 |
WANG G F , LIU C Y , DONG Y F , et al. IDCrypt: a multi-user searchable symmetric encryption scheme for cloud applications. IEEE Access, 2018, 6, 2908- 2921.
|
15 |
WANG H J , DONG X L , CAO Z F . Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Networking and Applications, 2019, 12 (1): 32- 42.
|
16 |
LI X H , TONG Q Y , ZHAO J W , et al. VRFMS: verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Transactions on Services Computing, 2023, 16 (1): 698- 710.
|
17 |
LU Y , LI J G , ZHANG Y C . Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Transactions on Services Computing, 2021, 14 (6): 2041- 2054.
|
18 |
CHEN B W , WU L B , KUMAR N , et al. Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data. IEEE Transactions on Emerging Topics in Computing, 2021, 9 (4): 1753- 1764.
|
19 |
SUN Y B , LI X F , LV F R , et al. Research on logistics information blockchain data query algorithm based on searchable encryption. IEEE Access, 2021, 9, 20968- 20976.
|
20 |
冯涛, 陈李秋, 方君丽, 等. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案. 通信学报, 2023, 44 (5): 224- 233.
|
|
FENG T , CHEN L Q , FANG J L , et al. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption. Journal on Communications, 2023, 44 (5): 224- 233.
|
21 |
郑东, 何俊杰, 秦宝东, 等. 可撤销的多关键字公钥可搜索加密方案. 计算机应用研究, 2023, 40 (7): 2179-2183, 2191.
|
|
ZHENG D , HE J J , QIN B D , et al. Multi-keyword public key searchable encryption scheme with keyword revocation. Application Research of Computers, 2023, 40 (7): 2179-2183, 2191.
|
22 |
宋安宁, 王宝成, 李化鹏. 基于无证书的具有否认认证的可搜索加密方案. 计算机应用研究, 2023, 40 (5): 1510- 1514.
|
|
SONG A N , WANG B C , LI H P . Certificateless cryption based public key keyword searchable encryption scheme with denial authentication. Application Research of Computers, 2023, 40 (5): 1510- 1514.
|
23 |
秦宝东, 陈从正, 何俊杰, 等. 基于可验证秘密共享的多关键词可搜索加密方案. 信息网络安全, 2023, 23 (5): 32- 40.
|
|
QIN B D , CHEN C Z , HE J J , et al. Multi-keyword searchable encryption scheme based on verifiable secret sharing. Netinfo Security, 2023, 23 (5): 32- 40.
|
24 |
袁承昊, 李勇, 任爽. 多关键词动态可搜索加密方案. 网络与信息安全学报, 2023, 9 (2): 143- 153.
|
|
YUAN C H , LI Y , REN S . Multi-keyword dynamic searchable encryption scheme. Chinese Journal of Network and Information Security, 2023, 9 (2): 143- 153.
|
25 |
崔新华, 田有亮, 张起嘉. 高效的可验证无证书可搜索加密方案. 通信学报, 2023, 44 (8): 61- 77.
|
|
CUI X H , TIAN Y L , ZHANG Q J . Efficient certificateless searchable encryption scheme with verifiability. Journal on Communications, 2023, 44 (8): 61- 77.
|
26 |
NAIR M S , RAJASREE M S . Fine-grained search and access control in multi-user searchable encryption without shared keys. Journal of Information Security and Applications, 2018, 41, 124- 133.
|
27 |
SUN L X , XU C X , LI C , et al. Server-aided searchable encryption in multi-user setting. Computer Communications, 2020, 164, 25- 30.
|