Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Platinum Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure Friend Discovery in Mobile Social Networks,” IEEE, 2011. [2] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Seer: A Secure and Efficient Service Review System for ServiceOriented Mobile Social Networks,” IEEE, 2012. [3] X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen, “Morality- Driven Data Forwarding with Privacy Preservation in Mobile Social Networks,” IEEE, 2012. [4] T.H. Luan, L.X. Cai, J. Chen, X. Shen, and F. Bai, “VTube: Towards the Media Rich City Life with Autonomous Vehicular Content Distribution,” IEEE, 2011. [5] J.R. Douceur, “The Sybil Attack,” Proc. Revised Papers First Int’l Workshop IPTPS, 2002. [6] J. Newsome, E. Shi, D.X. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses,” IPSN, 2004. [7] D. Quercia and S. Hailes, “Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue,” IEEE, 2010. [8] D. Quercia and S. Hailes, “Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue,” Proc. IEEE INFOCOM, pp. 336- 340, 2010. [9] R. Lu, X. Lin, X. Liang, and X. Shen, “A Dynamic Privacy-Preserving Key Management Scheme for LocationBased Services in VANETs,” IEEE Trans. Intelligent Transportation Systems, vol. 13, no. 1, pp. 127-139, Mar. 2012. [10] R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen, “Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs,” IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan. 2012. [11] X. Boyen and B. Waters, “Full-Domain Subgroup Hiding and Constant-Size Group Signatures,” Proc. 10th Int’l Conf. Practice and Theory Public Key Cryptography, pp. 1- 15, 2007. [12] X. Liang, Z. Cao, J. Shao, and H. Lin, “Short Group Signature without Random Oracles,” Proc. Ninth Int’l Conf. Information and Comm. Security (ICICS), pp. 69- 82, 2007.
![]() | V2I1269.pdf |