[1] |
ALI I, HASSAN A, LI F. Authentication and Privacy Schemes for Vehicular Ad Hoc Networks (VANETs): a Survey[J]. Vehicular Communications, 2019,16:45-61.
|
[2] |
DE LA TORRE G, RAD P, CHOO K K R. Driverless Vehicle Security: Challenges and Future Research Opportunities[J]. Future Generation Computer Systems, 2020,108:1092-1111.
|
[3] |
WANG C, GONG S, ZHOU A, et al. Cooperative Adaptive Cruise Control for Connected Autonomous Vehicles by Factoring Communication-related Constraints[J]. Transportation Research Part C: Emerging Technologies, 2020,113:124-145.
|
[4] |
BHOOPALAM A K, AGATZ N, ZUIDWIJK R. Planning of Truck Platoons: a Literature Review and Directions for Future Research[J]. Transportation Research Part B: Methodological, 2018,107:212-228.
|
[5] |
RAHIM A, KONG X, XIA F, et al. Vehicular Social Networks: a Survey[J]. Pervasive and Mobile Computing, 2018,43:96-113.
|
[6] |
LU Z, LIU W, WANG Q, et al. A Privacy-preserving Trust Model Based on Blockchain for VANETs[J]. IEEE Access, 2018,6:45655-45664.
|
[7] |
焦通, 申德荣, 聂铁铮, 等. 区块链数据库: 一种可查询且防篡改的数据库[J]. 软件学报, 2019,30(9):2671-2685.
|
|
JIAO Tong, SHEN Derong, NIE Tiezheng, et al. Blockchain Database: a Queryable and Tamper-resistance Database[J]. Journal of Software, 2019,30(9):2671-2685.
|
[8] |
SHU J, JIA X, YANG K, et al. Privacy-preserving Task Recommendation Services for Crowdsourcing[J]. IEEE Transactions on Services Computing, 2018, DOI: 10.1109/TSC.2018.2791601.
|
[9] |
SALEEM Y, CRESPI N, REHMANI M H, et al. Exploitation of Social IoT for Recommendation Services [C]// Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things. Piscataway: IEEE, 2016: 359-364.
|
[10] |
RONG H, WANG H M, LIU J, et al. Privacy-preserving K-nearest Neighbor Computation in Multiple Cloud Environments[J]. IEEE Access, 2016,4:9589-9603.
|
[11] |
SHEN M, TANG X, ZHU L, et al. Privacy-preserving Support Vector Machine Training over Blockchain-based Encrypted IoT Data in Smart Cities[J]. IEEE Internet of Things Journal, 2019,6(5):7702-7712.
|
[12] |
LIU X, DENG R H, CHOO K K R, et al. An Efficient Privacy-preserving Outsourced Calculation Toolkit with Multiple Keys[J]. IEEE Transactions on Information Forensics and Security, 2016,11(11):2401-2414.
|
[13] |
SHAMIR A. How to Share a Secret[J]. Communications of the ACM, 1979,22(11):612-613.
|
[14] |
LIU X, DENG R H, CHOO K K R, et al. Privacy-preserving Outsourced Support Vector Machine Design for Secure Drug Discovery[J]. IEEE Transactions on Cloud Computing, 2020,8(2):610-622.
|