An Effective Block-Chain Based Authentication Technique for Cloud Based IoT
暂无分享,去创建一个
[1] Markus Kraft,et al. Blockchain technology in the chemical industry: Machine-to-machine electricity market , 2017 .
[2] OthmanMazliza,et al. Internet of Things security , 2017 .
[3] Anthony Skjellum,et al. A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[4] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[5] David Schwartz,et al. The Ripple Protocol Consensus Algorithm , 2014 .
[6] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[7] Bayu Adhi Tama,et al. Tree-based classifier ensembles for early detection method of diabetes: an exploratory study , 2019, Artificial Intelligence Review.
[8] Prakash Veeraraghavan,et al. Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things , 2016, QSHINE.
[9] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011 .
[10] Jiangtao Wen,et al. The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.
[11] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[12] Andrew P. Martin,et al. Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.
[13] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[14] Ching-Hsien Hsu,et al. Efficient identity authentication and encryption technique for high throughput RFID system , 2016, Secur. Commun. Networks.
[15] Leïla Azouz Saïdane,et al. A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-health , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[16] Morteza Nikooghadam,et al. Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[17] Andrew S. Tanenbaum,et al. Distributed systems - principles and paradigms, 2nd Edition , 2007 .
[18] Naveen K. Chilamkurti,et al. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.
[19] Sherali Zeadally,et al. Impact of denial of service solutions on network quality of service , 2011, Secur. Commun. Networks.
[20] Antonio Pescapè,et al. On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[21] BottaAlessio,et al. Integration of Cloud computing and Internet of Things , 2016 .
[22] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[23] Qi Xia,et al. BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments , 2017, Inf..
[24] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[25] Kem Z. K. Zhang,et al. Blockchain-based sharing services: What blockchain technology can contribute to smart cities , 2016, Financial Innovation.
[26] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[27] 22nd International Symposium on Intensive Care and Emergency Medicine, Brussels, Belgium, 19–22 March 2002 , 2002, Critical care.
[28] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[29] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[30] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[31] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[32] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[33] Harry Chen,et al. SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[34] Yu Zhang,et al. An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[35] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[36] Jong Hyuk Park,et al. An efficient collusion resistant security mechanism for heterogeneous sensor networks , 2009, Internet Res..