• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4593696)   Today's Articles (2454)   Subscriber (49324)
For: Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X, Shu J. Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing. Sensors (Basel) 2018;18:E2659. [PMID: 30104516 DOI: 10.3390/s18082659] [Citation(s) in RCA: 29] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/21/2018] [Revised: 07/26/2018] [Accepted: 08/07/2018] [Indexed: 11/16/2022]
Number Cited by Other Article(s)
1
Sendhil R, Amuthan A. Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103383] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
2
Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102628] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA