Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database.
Peer Peer Netw. Appl., November, 2024
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation.
IEEE Trans. Serv. Comput., 2023
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT.
IEEE Trans. Emerg. Top. Comput., 2022
Smart Contract-Based Access Control Through Off-Chain Signature and On-Chain Evaluation.
IEEE Trans. Circuits Syst. II Express Briefs, 2022
Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique.
IEEE Trans. Knowl. Data Eng., 2021
An IoT-Applicable Access Control Model Under Double-Layer Blockchain.
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT.
IEEE Internet Things J., 2020
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment.
Comput. Secur., 2020
Fine-grained data access control with attribute-hiding policy for cloud-based IoT.
Comput. Networks, 2019
Efficient Attribute-Based Access Control With Authorized Search in Cloud Storage.
IEEE Access, 2019
Privacy-Preserving Interest-Ability Based Task Allocation in Crowdsourcing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT.
Proceedings of the IEEE Global Communications Conference, 2018
Privacy-Preserving <i>k</i>-Means Clustering under Multiowner Setting in Distributed Cloud Environments.
Secur. Commun. Networks, 2017
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework.
Proceedings of the Security and Privacy in Communication Networks, 2017
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating.
Proceedings of the Network and System Security - 11th International Conference, 2017
Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016