Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...