[1] |
吴振豪, 高健博, 李青山, 等. 数据安全治理中的安全技术研究[J]. 信息安全研究, 2021, 7(10):907-914.
|
|
WU Zhenhao, GAO Jianbo, LI Qingshan, et al. Research on Security Technology in Data Security Governance[J]. Journal of Information Security Research, 2021, 7(10):907-914.
|
[2] |
LYU L J, NANDASKUMAR K, RUBINSTEIN B, et al. PPFA:Privacy Preserving Fog-Enabled Aggregation in Smart Grid[J]. IEEE Transactions on Industrial Informatics, 2018, 14(8):3733-3744.
doi: 10.1109/TII.9424
|
[3] |
GE C P, YIN C C, LIU Z, et al. A Privacy Preserve Big Data Analysis System for Wearable Wireless Sensor Network[J]. Computers & Security, 2020(96):1-10.
|
[4] |
侯戌非. 物联网环境下海量多源异构数据的存储算法[J]. 宁夏师范学院学报, 2022, 43(7):80-85.
|
|
HOU Xufe. The Storage Algorithm of Multi-Source Heterogeneous Data in Internet of Things Environment[J]. Journal of Ningxia Normal University, 2022, 43(7):80-85.
|
[5] |
杨颜博, 张嘉伟, 马建峰. 一种使用区块链保护车联网数据隐私的方法[J]. 西安电子科技大学学报, 2021, 48(3):21-30.
|
|
YANG Yanbo, ZHANG Jiawei, MA Jianfeng. Method for Using the Blockchain to Protect Data Privacy of IoV[J]. Journal of Xidian University, 2021, 48(3):21-30.
|
[6] |
SHEN H, ZHANG M W, WANG H, et al. A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme[J]. IEEE Internet of Things Journal, 2020, 7(4):3083-3093.
doi: 10.1109/JIoT.6488907
|
[7] |
SHERRY J, LAN C, POPA R A, et al. BlindBox:Deep Packet Inspection over Encrypted Traffic[J]. ACM Sigcomm Computer Communication Review, 2015, 45(4):213-226.
doi: 10.1145/2829988.2787502
|
[8] |
NING J T, POH G S, LOH J C, et al. PrivDPI:Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules[C]// ACM Conference on Computer and Communications Security. New York: ACM, 2019:1657-1670.
|
[9] |
TANG Q, PEJO B, WANG H. Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations[C]// IEEE International Conference on Cloud Computing.Piscataway:IEEE, 2016:941-946.
|
[10] |
MCCANNE S, JACOBSON V. The BSD Packet Filter:A New Architecture for User-Level Packet Capture[C]// USENIX Winter Conference on USENIX Winter Conference.Berkeley:USENIX, 1993:259-270.
|
[11] |
LEE C H, CHUANG C W. Efficient Search in Graph Databases Using Cross Filtering[J]. Information Sciences, 2014, 286:1-18.
doi: 10.1016/j.ins.2014.06.047
|
[12] |
LIU J X, TANG M D, ZHENG Z B, et al. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation[J]. IEEE Transactions on Services Computing, 2016, 9(5):686-699.
doi: 10.1109/TSC.4629386
|
[13] |
OGONJI M M, OKEYO G, WAFULA J M. A Survey on Privacy and Security of Internet of Things[J]. Computer Science Review, 2020, 38(7):100312.
doi: 10.1016/j.cosrev.2020.100312
|
[14] |
曾勇, 吴正远, 董丽华, 等. 加密流量中的恶意流量识别技术[J]. 西安电子科技大学学报, 2021, 48(3):170-187.
|
|
ZENG Yong, WU Zhengyuan, DONG Lihua, et al. Research on Malicious Traffic Identification Technology in Encrypted Traffic[J]. Journal of Xidian University, 2021, 48(3):170-187.
|
[15] |
JIANG P, WANG Q, HUANG M, et al. Building In-the-Cloud Network Functions:Security and Privacy Challenges[J]. Proceedings of the IEEE, 2021, 109(12):1888-1919.
doi: 10.1109/JPROC.2021.3127277
|
[16] |
OSTROVSKY R, SKEITH. III W E. Private Searching on Streaming Data[J]. Journal of Cryptology, 2007, 20(4):397-430.
doi: 10.1007/s00145-007-0565-3
|
[17] |
YUAN X L, WANG X Y, LIN J X, et al. Privacy-Preserving Deep Packet Inspection in Outsourced Middleboxes[C]// In 35th Annual IEEE International Conference on Computer Communications,INFOCOM 2016.Piscataway:IEEE, 2016:1-9.
|
[18] |
KIM J, CAMTEPE S, BAEK J, et al. P2DPI:Practical and Privacy-Preserving Deep Packet Inspection[C]// ASIA CCS 21:ACM Asia Conference on Computer and Communications Security. New York: ACM, 2021:135-146.
|
[19] |
NING J, HUANG X, POH G S, et al. Pine:Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment[C]// European Symposium on Research in Computer Security.Berlin:Springer, 2020:3-22.
|
[20] |
WEN J, LIU J, WU A, et al. A General Framework for Matching Pattern Hiding in Deep Packet Inspection[C]// International Conference on Information Security Applications.Berlin:Springer, 2021:243-254.
|
[21] |
REN H, LI H W, LIU D X, et al. Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox[J]. IEEE Transactions on Cloud Computing, 2022, 10(2):1052-1064.
doi: 10.1109/TCC.2020.2991167
|
[22] |
REN H, LI H W, LIU D X, et al. Enabling Secure and Versatile Packet Inspection with Probable Cause Privacy for Outsourced Middlebox[J]. IEEE Transactions on Cloud Computing, 2022, 10 (4):2580-2594.
doi: 10.1109/TCC.2021.3059026
|
[23] |
BONEHD, CRESCENZO G D, OSTROVSKY R, et al. Public Key Encryption with Keyword Search[C]// International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer, 2004:506-522.
|
[24] |
JING P, GUO F C, SUSILO W, et al. Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption[J]. Encyclopedia of Big Data Technologies, 2019:1067-1087.
|
[25] |
LU R, LIN X, LUAN T H, et al. PRefilter:An Efficient Privacy-Preserving Relay Filtering Scheme for Delay Tolerant Networks[C]// International Conference on Computer Communications.Piscataway:IEEE, 2012:1395-1403.
|
[26] |
WANG X F, MU Y, CHEN R M. Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication[J]. Wireless Personal Communication, 2017, 95:3509-3537.
doi: 10.1007/s11277-017-4010-0
|
[27] |
JING P, GUO F C, SUSILO W, et al. PPFilter:Provider Privacy-Aware Encrypted Filtering System[J]. IEEE Transactions on Services Computing, 2021, 14(5):1519-1530.
doi: 10.1109/TSC.2018.2873656
|