eHAPAC: A Privacy-Supported Access Control Model for IP-Enabled Wireless Sensor Networks
暂无分享,去创建一个
[1] Mohsen Guizani,et al. Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.
[2] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[3] Kui Ren,et al. DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.
[4] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[5] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[6] Antonio F. Gómez-Skarmeta,et al. PrivaKERB: A user privacy framework for Kerberos , 2011, Comput. Secur..
[7] Jing Li,et al. Cryptographic primitives in blockchains , 2019, J. Netw. Comput. Appl..
[8] Maode Ma,et al. Secure Group Mobility Support for 6LoWPAN Networks , 2018, IEEE Internet of Things Journal.
[9] Chun Chen,et al. Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[10] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[11] Yuguang Fang,et al. Latency Aware IPv6 Packet Delivery Scheme over IEEE 802.15.4 Based Battery-Free Wireless Sensor Networks , 2017, IEEE Transactions on Mobile Computing.
[12] Nerea Toledo,et al. Enhancing secure access to sensor data with user privacy support , 2014, Comput. Networks.
[13] Qi Zhang,et al. Improved Dual-Protected Ring Signature for Security and Privacy of Vehicular Communications in Vehicular Ad-Hoc Networks , 2018, IEEE Access.
[14] Kunwar Singh,et al. Efficient weighted threshold ECDSA for securing bitcoin wallet , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).
[15] Yu Zhou,et al. Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities , 2018, Future Gener. Comput. Syst..
[16] Salil S. Kanhere,et al. BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.
[17] Chunhua Jin,et al. Cost-Effective and Anonymous Access Control for Wireless Body Area Networks , 2018, IEEE Systems Journal.
[18] Feng Bao,et al. Evolving privacy: From sensors to the Internet of Things , 2017, Future Gener. Comput. Syst..
[19] Pablo Rodriguez,et al. If you are not paying for it, you are the product: how much do advertisers pay to reach you? , 2017, Internet Measurement Conference.
[20] Claudio Bettini,et al. The Privacy Implications of Cyber Security Systems , 2018, ACM Comput. Surv..
[21] Mohsen Guizani,et al. Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.
[22] Monali Mavani,et al. Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan , 2018, Ad Hoc Networks.
[23] Marcelo S. Alencar,et al. Survey and systematic mapping of industrial Wireless Sensor Networks , 2017, J. Netw. Comput. Appl..
[24] Hervé Rivano,et al. Optimal WSN Deployment Models for Air Pollution Monitoring , 2017, IEEE Transactions on Wireless Communications.
[25] Vladimiro Sassone,et al. Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[26] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[27] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[28] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[29] David Palma,et al. Enabling the Maritime Internet of Things: CoAP and 6LoWPAN Performance Over VHF Links , 2018, IEEE Internet of Things Journal.
[30] Mihir Bellare,et al. Foundations of Group Signatures: The Case of Dynamic Groups , 2005, CT-RSA.
[31] Abderrezak Rachedi,et al. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..
[32] François-Xavier Standaert,et al. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[33] Robert H. Deng,et al. Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things , 2018, J. Netw. Comput. Appl..
[34] Yi Mu,et al. Communication security and privacy support in 6LoWPAN , 2017, J. Inf. Secur. Appl..
[35] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[36] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[37] Evangelos P. Markatos,et al. Where's Wally?: How to Privately Discover your Friends on the Internet , 2018, AsiaCCS.
[38] Roberto Saia,et al. Internet of Entities (IoE): a Blockchain-based Distributed Paradigm to Security , 2018, ArXiv.
[39] David Pointcheval,et al. Dynamic Fully Anonymous Short Group Signatures , 2006, VIETCRYPT.
[40] Diego Reforgiato Recupero,et al. Internet of Entities (IoE): A Blockchain-based Distributed Paradigm for Data Exchange between Wireless-based Devices , 2019, SENSORNETS.
[41] Sherali Zeadally,et al. Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..
[42] Saurabh Bagchi,et al. Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.
[43] Maider Huarte,et al. Expressive Policy-Based Access Control for Resource-Constrained Devices , 2018, IEEE Access.
[44] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[45] Eduardo Adílio Pelinson Alchieri,et al. Device-Based Security to Improve User Privacy in the Internet of Things † , 2018, Sensors.