[1] |
Khan Z, Kiani S L.A cloud-based architecture for citizen services in smart cities[C]∥Proc of the 2012 IEEE/ACM 5th International Conference on Utility and Cloud Computing,2012:315-320.
|
[2] |
Clohessy T,Acton T,Morgan L,et al.Smart city as a service (SCaaS):A future roadmap for E-government smart city cloud computing initiatives[C]∥Proc of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Comput- ing,2014:836-841.
|
[3] |
Monzon A.Smart cities concept and challenges:Bases for the assessment of smart city projects[C]∥Proc of 2015 International Conference on Smart Cities and Green ICT Systems,2015:17-31.
|
[4] |
Zhang Yu-qing,Zhou Wei,Peng An-ni.Survey of internet of things security[J].Journal of Research and Development,2017,54(10):2130-2143.(in Chinese)
|
[5] |
Xu Zhi-wei,Zeng Chen,Chao Lu,et al.Zone-oriented architecture:An architectural style for smart web of everything[J].Journal of Research and Development,2019,56(1):90-102.(in Chinese)
|
[6] |
Fiat A,Naor M.Broadcast encryption[C]∥Proc of the 13th Annual International Cryptology Conference,1993:480-491.
|
[7] |
Canard S,Phan D H,Trinh V C,et al.Attribute-based broadcast encryption scheme for lightweight devices[J].IET Information Security,2017,12(1):52-59.
|
[8] |
Sun M,Ge C,Fang L,et al.A proxy broadcast re-encryption for cloud data sharing[J].Multimedia Tools and Applications, 2018,77(9):10455-10469.
|
[9] |
Zhang J,Mao J.Anonymous multi-receiver broadcast encryption scheme with strong security[J].International Journal of Embedded Systems,2017,9(2):177-187.
|
[10] |
Zhang L, Hu Y,Wu Q,et al.Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups[J].Mathematical and Computer Modelling,2012,55(1):12-18.
|
[11] |
Reid B. Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city[J].Computing Reviews,2018,59(3):186-186.
|
[12] |
Zhang M,Yang B,Chen Z,et al.Efficient and adaptively secure broadcast encryption systems[J].Security and Communication Networks,2013,6(8):1044-1052.
|
[13] |
Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers[C]∥Proc of Annual International Cryptology Conference,2001:41-62.
|
[14] |
Naor M,Pinkas B.Efficient trace and revoke schemes[C]∥Proc of the 4th International Conference on Financial Cryptography,2000:1-20.
|
[15] |
Li Qiang,Feng Deng-guo,Zhang Li-wu.Attribute-based authenticated key agreement protocol supporting revocation[J].Journal of Communications,2014,35(5):33-43.(in Chinese)
|
[16] |
Wang Peng-pian, Feng Deng-guo,Zhang Li-wu.CP-ABE scheme supporting fully fine-grained attribute revocation[J].Journal of Software,2012,23(10):2805-2816.(in Chinese)
|
[17] |
Zhang Bing-hong,Zhang Chuan-rong,Jiao He-ping,et al.Secure model of cloud storage supporting attribute revocation[J].Computer Science,2015,42(7):210-215.(in Chinese)
|
[18] |
Lai J,Mu Y,Guo F,et al.Anonymous identity-based broadcast encryption with revocation for file sharing[C]∥Proc of Australasian Conference on Information Security and Privacy,2016:223-239.
|
[19] |
Lai J C,Mu Y,Guo F C,et al.Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city[J].Personal and Ubiquitous Computing,2017,21(5):855-868.
|
[20] |
Zhang L Y, Wu Q,Mu Y. Anonymous identity-based broadcast encryption with adaptive security[C]∥Proc of International Symposium on Cyberspace Safety and Security,2013:258-271.
|
[21] |
The pairing-based cryptography library[EB/OL].[2020-11-12].http://crypto.stanford.edu/pbc/.
|
|
附中文参考文献:
|
[4] |
张玉清,周威,彭安妮.物联网安全综述[J].计算机研究与发展,2017,54(10):2130-2143.
|
[5] |
徐志伟,曾琛,朝鲁,等.面向控域的体系结构:一种智能万物互联的体系结构风格[J].计算机研究与发展,2019,56(1):90-102.
|
[15] |
李强,冯登国,张立武.支持用户撤销的属性认证密钥协商协议[J].通信学报,2014,35(5):33-43.
|
[16] |
王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案[J].软件学报,2012,23(10):2805-2816.
|
[17] |
张柄虹,张串绒,焦和平,等.一种属性可撤销的安全云存储模型[J].计算机科学,2015,42(7):210-215.
|