{"id":"https://openalex.org/W2946116576","doi":"https://doi.org/10.1145/3317549.3326319","title":"Preserving privacy of drone videos using proxy re-encryption technique","display_name":"Preserving privacy of drone videos using proxy re-encryption technique","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2946116576","doi":"https://doi.org/10.1145/3317549.3326319","mag":"2946116576"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3326319","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008146726","display_name":"Vashish Baboolal","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vashish Baboolal","raw_affiliation_strings":["Florida International University"],"affiliations":[{"raw_affiliation_string":"Florida International University","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078029373","display_name":"Kemal Akkaya","orcid":"https://orcid.org/0000-0002-7103-4545"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kemal Akkaya","raw_affiliation_strings":["Florida International University"],"affiliations":[{"raw_affiliation_string":"Florida International University","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042862500","display_name":"Nico Saputro","orcid":"https://orcid.org/0000-0002-0842-1155"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nico Saputro","raw_affiliation_strings":["Florida International University"],"affiliations":[{"raw_affiliation_string":"Florida International University","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054082735","display_name":"Khaled Rabieh","orcid":"https://orcid.org/0000-0003-2828-6971"},"institutions":[{"id":"https://openalex.org/I191429286","display_name":"Sam Houston State University","ror":"https://ror.org/00yh3cz06","country_code":"US","type":"education","lineage":["https://openalex.org/I191429286"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Khaled Rabieh","raw_affiliation_strings":["Sam Houston State University"],"affiliations":[{"raw_affiliation_string":"Sam Houston State University","institution_ids":["https://openalex.org/I191429286"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5008146726"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":0.42,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7002409,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"336","last_page":"337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.8925929069519043},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8330734372138977},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8133325576782227},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7936701774597168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7194070816040039},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5810602903366089},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5535677671432495},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5200364589691162},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5061282515525818},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.48352527618408203},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4518702030181885},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20899438858032227}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.8925929069519043},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8330734372138977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8133325576782227},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7936701774597168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7194070816040039},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5810602903366089},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5535677671432495},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5200364589691162},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5061282515525818},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.48352527618408203},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4518702030181885},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20899438858032227},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3317549.3326319","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W126735607","https://openalex.org/W2078590992","https://openalex.org/W2597364644","https://openalex.org/W2910207341","https://openalex.org/W3213458668"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W2158897804","https://openalex.org/W2286370870","https://openalex.org/W3173222018"],"abstract_inverted_index":{"Unmanned":[0],"Aerial":[1],"Vehicles":[2],"(UAVs)":[3],"also":[4],"known":[5],"as":[6,50],"drones":[7,32],"are":[8,96],"being":[9],"used":[10,125],"in":[11,83,105],"many":[12],"applications":[13,24],"where":[14,31],"they":[15],"can":[16,78,89,123,158],"record":[17,36],"or":[18,53,66],"stream":[19],"video.":[20],"One":[21],"of":[22,64],"such":[23,49,57,103],"is":[25,135,148],"the":[26,59,76,84,94,130,154,161],"Intelligent":[27],"Transportation":[28],"Systems":[29],"(ITS)":[30],"may":[33],"need":[34],"to":[35,43,98,119,128],"videos":[37],"and":[38,81],"send":[39],"a":[40,110,117,138],"control":[41,140],"center":[42],"be":[44,79,91,124],"shared":[45],"by":[46,137],"various":[47],"clients":[48],"law":[51],"enforcement":[52],"emergency":[54],"personnel.":[55],"In":[56],"cases,":[58,104],"recording":[60],"might":[61,71],"include":[62],"faces":[63],"civilians":[65],"other":[67],"sensitive":[68],"information":[69],"that":[70,86,114,122,146],"pose":[72],"privacy":[73],"concerns.":[74],"While":[75],"video":[77],"encrypted":[80],"stored":[82],"cloud":[85],"way,":[87],"it":[88,157],"still":[90,159],"accessed":[92],"once":[93,127],"keys":[95],"exposed":[97],"third":[99,120],"parties.":[100],"To":[101],"prevent":[102],"this":[106],"paper,":[107],"we":[108],"propose":[109],"proxy":[111],"re-encryption":[112],"technique":[113],"will":[115],"provide":[116],"key":[118,133],"parties":[121],"only":[126],"access":[129],"videos.":[131],"The":[132,142],"management":[134],"handled":[136],"trusted":[139],"center.":[141],"implementation":[143],"results":[144],"indicate":[145],"there":[147],"almost":[149],"no":[150],"additional":[151],"overhead":[152],"with":[153],"approach":[155],"while":[156],"preserve":[160],"privacy.":[162]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
