TY - JOUR AU - Wu, D. AU - Au, M. H. AU - Yan, J. AU - Wang, H. AU - Wu, D. AU - Wang, R. PY - 2017 DA - 2017// TI - Social attribute aware incentive mechanisms for video distribution in device-to-device communications JO - IEEE Trans Multimed VL - 19 ID - Wu2017 ER - TY - JOUR AU - Wu, D. AU - Liu, Q. AU - Wang, H. AU - Wu, D. AU - Wang, R. PY - 2017 DA - 2017// TI - Socially aware energy efficient mobile edge collaboration for video distribution JO - IEEE Trans Multimed VL - 19 ID - Wu2017 ER - TY - STD TI - Sangaiah AK, Hosseinabadi AAR, Sadeghilalimi M, Zhang W (2019) Energy consumption in point-coverage wireless sensor networks via bat algorithm. IEEE Access:1–1. doi:10.1109/ACCESS.2019.2952644. ID - ref3 ER - TY - JOUR AU - Shen, J. AU - Shen, J. AU - Chen, X. AU - Huang, X. AU - Susilo, W. PY - 2017 DA - 2017// TI - An efficient public auditing protocol with novel dynamic structure for cloud data JO - IEEE Trans Inf Forensic Secur VL - 12 ID - Shen2017 ER - TY - JOUR AU - Green, M. PY - 2013 DA - 2013// TI - The threat in the cloud JO - IEEE Sec Priv VL - 11 ID - Green2013 ER - TY - JOUR AU - Fernandes, D. A. AU - Soares, L. F. AU - Gomes, J. V. AU - Freire, M. M. AU - Inácio, P. R. PY - 2014 DA - 2014// TI - Security issues in cloud environments: a survey JO - Int J Inf Sec VL - 13 ID - Fernandes2014 ER - TY - JOUR AU - Dudin, E. AU - Smetanin, Y. G. PY - 2011 DA - 2011// TI - A review of cloud computing JO - Sci Tech Inf Process VL - 38 ID - Dudin2011 ER - TY - JOUR AU - Wang, B. AU - Li, B. AU - Li, H. PY - 2013 DA - 2013// TI - Panda: Public auditing for shared data with efficient user revocation in the cloud JO - IEEE Trans Serv Comput VL - 8 ID - Wang2013 ER - TY - STD TI - Li J, Yan H, Zhang Y (2018) Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput:1–12. doi:10.1109/TSC.2018.2789893. ID - ref9 ER - TY - JOUR AU - Wang, X. A. AU - Liu, Y. AU - Sangaiah, A. K. AU - Zhang, J. PY - 2019 DA - 2019// TI - Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting JO - Computing VL - 101 ID - Wang2019 ER - TY - JOUR AU - Kim, D. AU - Kwon, H. AU - Hahn, C. AU - Hur, J. PY - 2016 DA - 2016// TI - Privacy-preserving public auditing for educational multimedia data in cloud computing JO - Multimed Tools Appl VL - 75 ID - Kim2016 ER - TY - JOUR AU - Zhang, Y. AU - Xu, C. AU - Li, H. AU - Liang, X. PY - 2016 DA - 2016// TI - Cryptographic public verification of data integrity for cloud storage systems JO - IEEE Cloud Comput VL - 3 ID - Zhang2016 ER - TY - JOUR AU - Zhang, J. AU - Wang, B. AU - He, D. PY - 2019 DA - 2019// TI - Improved secure fuzzy auditing protocol for cloud data storage JO - Soft Comput VL - 23 ID - Zhang2019 ER - TY - JOUR AU - Fu, A. AU - Shui, Y. AU - Zhang, Y. AU - Wang, H. AU - Huang, C. PY - 2017 DA - 2017// TI - NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users JO - IEEE Trans Big Data VL - 99 ID - Fu2017 ER - TY - JOUR AU - Shen, W. AU - Yu, J. AU - Xia, H. AU - Zhang, H. AU - Lu, X. AU - Hao, R. PY - 2017 DA - 2017// TI - Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium JO - J Netw Comput Appl VL - 82 ID - Shen2017 ER - TY - JOUR AU - Rodrigues, J. J. P. C. AU - Wang, X. PY - 2018 DA - 2018// TI - Guest editorial Special Issue on integrated computing: computational intelligence paradigms and Internet of Things for industrial applications JO - IEEE Internet of Things J VL - 5 ID - Rodrigues2018 ER - TY - JOUR AU - Phong, L. T. AU - Aono, Y. AU - Hayashi, T. AU - Wang, L. AU - Moriai, S. PY - 2018 DA - 2018// TI - Privacy-preserving deep learning via additively homomorphic encryption JO - IEEE Trans Inf Forensic Secur VL - 13 ID - Phong2018 ER - TY - JOUR AU - Phong, L. T. AU - Phuong, T. T. PY - 2019 DA - 2019// TI - Privacy-preserving deep learning via weight transmission JO - IEEE Trans Inf Forensics Secur VL - 14 ID - Phong2019 ER - TY - STD TI - Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, et al (2007) Provable data possession at untrusted stores In: Proceedings of the 14th ACM conference on Computer and communications security, 598–609.. ACM. doi:10.1145/1315245.1315318. ID - ref19 ER - TY - STD TI - Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession In: Proceedings of the 4th international conference on Security and privacy in communication netowrks, 1–9.. ACM. doi:10.1145/1460877.1460889. ID - ref20 ER - TY - CHAP AU - Wang, Q. AU - Wang, C. AU - Li, J. AU - Ren, K. AU - Lou, W. PY - 2009 DA - 2009// TI - Enabling public verifiability and data dynamics for storage security in cloud computing BT - European symposium on research in computer security PB - Springer CY - Berlin ID - Wang2009 ER - TY - JOUR AU - Guo, C. AU - Luo, N. AU - Bhuiyan, M. Z. A. AU - Jie, Y. AU - Chen, Y. AU - Feng, B. PY - 2018 DA - 2018// TI - Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage JO - Futur Gener Comput Syst VL - 84 ID - Guo2018 ER - TY - JOUR AU - Shen, W. AU - Qin, J. AU - Yu, J. AU - Hao, R. AU - Hu, J. PY - 2019 DA - 2019// TI - Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage JO - IEEE Trans Inf Forensic Secur VL - 14 ID - Shen2019 ER - TY - JOUR AU - Chi, P. W. AU - Lei, C. L. PY - 2015 DA - 2015// TI - Audit-free cloud, Storage via deniable attribute-based encryption JO - IEEE Trans Cloud Comput VL - 6 ID - Chi2015 ER - TY - JOUR AU - Yu, J. AU - Wang, H. PY - 2017 DA - 2017// TI - Strong key-exposure resilient auditing for secure cloud storage JO - IEEE Trans Inf Forensic Secur VL - 12 ID - Yu2017 ER - TY - JOUR AU - Harn, L. PY - 1994 DA - 1994// TI - Group-oriented (t, n) threshold digital signature scheme and digital multisignature JO - IEE Proc Comput Digit Techniques VL - 141 ID - Harn1994 ER - TY - JOUR AU - Wang, H. PY - 2014 DA - 2014// TI - Identity-based distributed provable data possession in multicloud storage JO - IEEE Trans Serv Comput VL - 8 ID - Wang2014 ER - TY - STD TI - Nagar P, Sethia D (2017) Group authorization using threshold signatures for medical procedures In: 2017 9th International Conference on Communication Systems and Networks (COMSNETS), 492–497.. IEEE. doi:10.1109/COMSNETS.2017.7945441. ID - ref28 ER - TY - JOUR AU - Harn, L. AU - Wang, F. PY - 2016 DA - 2016// TI - Threshold signature scheme without using polynomial interpolation JO - IJ Netw Secur VL - 18 ID - Harn2016 ER - TY - JOUR AU - Shen, J. AU - Zheng, W. Y. AU - Wang, J. AU - Zheng, Y. H. AU - Sun, X. M. AU - Lee, S. Y. PY - 2013 DA - 2013// TI - An efficient verifiably encrypted signature from weil pairing JO - J Internet Technol VL - 14 ID - Shen2013 ER - TY - STD TI - Rabaninejad R, Ahmadian AM, Asaar M, Aref M (2019) A lightweight auditing service for shared data with secure user revocation in cloud storage. IEEE Trans Serv Comput:1–1. doi:10.1109/TSC.2019.2919627. ID - ref31 ER - TY - JOUR AU - Zhang, Y. AU - Yu, J. AU - Hao, R. AU - Wang, C. AU - Ren, K. PY - 2020 DA - 2020// TI - Enabling effcient user revocation in identity-based cloud storage auditing for shared big data JO - IEEE Trans Dependable Secure Comput VL - 17 ID - Zhang2020 ER - TY - STD TI - Martin KM (2005) Dynamic access policies for unconditionally secure secret sharing schemes In: IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 61–66.. IEEE. doi:10.1109/ITWTPI.2005.1543958. ID - ref33 ER - TY - JOUR AU - Jie, Y. AU - Yu, L. AU - Li-yun, C. AU - Wei, N. PY - 2016 DA - 2016// TI - A SM2 elliptic curve threshold signature scheme without a trusted center JO - KSII Trans Internet Inf Syst VL - 10 ID - Jie2016 ER - TY - STD TI - Shimbre N, Deshpande P (2015) Enhancing Distributed Data Storage security for cloud computing using TPA and AES algorithm In: 2015 International Conference on Computing Communication Control and Automation, 35–39.. IEEE. doi:10.1109/ICCUBEA.2015.16. ID - ref35 ER - TY - JOUR AU - Wang, B. AU - Li, B. AU - Li, H. PY - 2014 DA - 2014// TI - Oruta: privacy-preserving public auditing for shared data in the cloud JO - IEEE Trans Cloud Comput VL - 2 ID - Wang2014 ER - TY - JOUR AU - Sangaiah, A. K. AU - Medhane, D. V. AU - Han, T. AU - Hossain, M. S. AU - Muhammad, G. PY - 2019 DA - 2019// TI - Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics JO - IEEE Trans Ind Inform VL - 15 ID - Sangaiah2019 ER - TY - STD TI - Sangaiah AK, Medhane DV, Bian G, Ghoneim A, Alrashoud M, Hossain MS (2019) Energy-aware green adversary model for Cyber physical security in industrial system. IEEE Trans Ind Inform:1–1. doi:10.1109/TII.2019.2953289. ID - ref38 ER - TY - JOUR AU - Shamir, A. PY - 1979 DA - 1979// TI - How to share a secret JO - Commun ACM VL - 22 ID - Shamir1979 ER - TY - STD TI - Wu D, Si S, Wu S, Wang R (2017) Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet Things J:10. doi:10.1109/JIOT.2017.2768073. ID - ref40 ER - TY - STD TI - Zhu Y, Zhang Y (2006) Elliptic curve public key cryptosystem guidance, 246.. Science Press, Beijing. ID - ref41 ER - TY - JOUR AU - Jiang, T. AU - Chen, X. AU - Ma, J. PY - 2015 DA - 2015// TI - Public integrity auditing for shared dynamic cloud data with group user revocation JO - IEEE Trans Comput VL - 65 ID - Jiang2015 ER - TY - JOUR AU - Yuan, J. AU - Yu, S. PY - 2015 DA - 2015// TI - Public integrity auditing for dynamic data sharing with multiuser modification JO - IEEE Trans Inf Forensic Secur VL - 10 ID - Yuan2015 ER - TY - JOUR AU - Liu, C. W. AU - Hsien, W. F. AU - Yang, C. C. AU - Hwang, M. S. PY - 2016 DA - 2016// TI - A survey of public auditing for shared data storage with user revocation in cloud computing JO - IJ Netw Secur VL - 18 ID - Liu2016 ER - TY - JOUR AU - Wang, X. A. AU - Weng, J. AU - Ma, J. AU - Yang, X. PY - 2019 DA - 2019// TI - Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification JO - Inf Sci VL - 488 ID - Wang2019 ER -