1. Deebak B D, Al-Turjman F. Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things. IEEE Journal on Selected Areas in Communications, 2021, 39(2): 346-360
2. Srinivas J, Das A K, Wazid M, et al. Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. IEEE Internet of Things Journal, 2021, 8(9): 7727-7744
3. Zhang Z Y, Deng R L, Yau D K Y, et al. Zero-parameter-information data integrity attacks and countermeasures in IoT-based smart grid. IEEE Internet of Things Journal, 2021, 8(8): 6608-6623
4. Ren K, Wang C, Wang Q. Security challenges for the public cloud. IEEE Internet Computing, 2012, 16(1): 69-73
5. Luo W, Ma W P, Gao J T. MHB*T based dynamic data integrity auditing in cloud storage. Cluster Computing: The Journal of Networks, Software Tools and Applications, 2021, 24(3): 2115-2132
6. Gudeme J R, Pasupuleti S K, Kandukuri R. Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage. Computers & Security, 2021, 103: Article 102176
7. Shacham H, Waters B. Compact proofs of retrievability. Journal of Cryptology, 2013, 26(3): 442-483
8. Yang Y, Chen Y J, Chen F. A compressive integrity auditing protocol for secure cloud storage. IEEE/ACM Transactions on Networking, 2021, 29(3): 1197-1209
9. Wang C, Chow S S M, Wang Q, et al. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2013, 62(2): 362-375
10. Erway C C, Küpçü A. Papamanthou C, et al. Dynamic provable data possession. ACM Transactions on Information and System Security, 2015, 17(4): 1-29
11. Al-Riyami S S, Paterson K G. Certificateless public key cryptography. Advances in Cryptology: Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’03), 2003, Nov 30-Dec 4, Taipei, China. LNCS 2894. Berlin, Germany: Springer, 2003: 452- 473
12. He D B, Zeadally S, Wu L B. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2018, 12(1): 64-73
13. He D B, Kumar N, Zeadally S, et al. Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Industrial Informatics, 2018, 14(3): 1232-1241
14. Zhao K X, Sun D, Ren G, et al. Public auditing scheme with identity privacy preserving based on certificateless ring signature for wireless body area networks. IEEE Access, 2020, 8: 41975-41984
15. Vamshi A, Rao G J, Pasupuleti S K, et al. EPF-CLPA: An efficient pairing-free certificateless public auditing for cloud-based CPS. Proceedings of the 5th International Conference on Intelligent Computing and Control Systems (ICICCS’21), 2021, May 6-8, Madurai, India. Piscataway, NJ, USA: IEEE, 2021: 48-54
16. Zheng Y. Methodologies for cross-domain data fusion: An overview. IEEE Transactions on Big Data, 2015, 1(1): 16-34
17. Singh P, Masud M, Shamim Hossain M, et al. Cross-domain secure data sharing using blockchain for industrial IoT. Journal of Parallel and Distributed Computing, 2021, 156: 176-184
18. Yang X, Lu R X, Choo K K R, et al. Achieving efficient and privacy-preserving cross-domain big data deduplication in cloud. IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2721444
19. Fan K, Pan Q, Wang J X, et al. Cross-domain based data sharing scheme in cooperative edge computing. Proceedings of the 2018 IEEE International Conference on Edge Computing (EDGE’18), 2018, Jul 2-7, San Francisco, CA, USA. Piscataway, NJ, USA: IEEE, 2018: 87-92
20. Jiang X T, Yu F R, Song T, et al. Blockchain-enabled cross-domain object detection for autonomous driving: A model sharing approach. IEEE Internet of Things Journal, 2020, 7(5): 3681-3692
21. Zheng J W, Dong X W, Shen Y L, et al. Decentralized and secure cross-domain data sharing scheme based on blockchain for application-centric IoT. Journal of Information Science and Engineering, 2020, 36(4): 1-15
|