Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking
暂无分享,去创建一个
Borja Bordel | Ramón Alcarria | Tomas Robles | Marcos Sánchez Iglesias | T. Robles | R. Alcarria | Borja Bordel
[1] Nils Ole Tippenhauer,et al. Legacy-Compliant Data Authentication for Industrial Control System Traffic , 2017, ACNS.
[2] Gwenaël J. Doërr,et al. Practical Security Analysis of Dirty Paper Trellis Watermarking , 2007, Information Hiding.
[3] Borja Bordel,et al. Improving the Complexity of the Lorenz Dynamics , 2017, Complex..
[4] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[5] Taekyoung Kwon,et al. A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things , 2020, IEEE Access.
[6] F. Montoya,et al. Trifork , a New Pseudorandom Number Generator Based on Lagged Fibonacci Maps , 2010 .
[7] Borja Bordel,et al. Protecting Industry 4.0 Systems Against the Malicious Effects of Cyber-Physical Attacks , 2017, UCAmI.
[8] Elena Dubrova,et al. CRC-Based Message Authentication for 5G Mobile Technology , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[9] Yanina Protskaya,et al. An anonymization protocol for the Internet of Things , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).
[10] Juha Karhunen,et al. Advances in blind source separation (BSS) and independent component analysis (ICA) for nonlinear mixtures , 2004, Int. J. Neural Syst..
[11] J. Mallet-Paret,et al. The Poincare-Bendixson theorem for monotone cyclic feedback systems , 1990 .
[12] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[13] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[14] Ernesto Damiani,et al. A Distributed Approach to Privacy on the Cloud , 2015, 1503.08115.
[15] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[16] Borja Bordel,et al. Robust hardware-supported chaotic cryptosystems for streaming commutations among reduced computing power nodes , 2018, Analog Integrated Circuits and Signal Processing.
[17] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[18] V. Masilamani,et al. A novel digital watermarking scheme for data authentication and copyright protection in 5G networks , 2018, Comput. Electr. Eng..
[19] Bashar Nuseibeh,et al. Designing Privacy-aware Internet of Things Applications , 2017, Inf. Sci..
[20] Ramón Alcarria,et al. Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions , 2019, Electronics.
[21] Borja Bordel,et al. Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design , 2020, Int. J. Distributed Sens. Networks.
[22] Huei-Wen Ferng,et al. On security of wireless sensor networks: a data authentication protocol using digital signature , 2017, Wirel. Networks.
[23] Andrea Cavallaro,et al. Mobile Sensor Data Anonymization , 2019 .
[24] A. Akhavan,et al. A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .
[25] Bashar Nuseibeh,et al. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.
[26] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[27] Borja Bordel,et al. Stochastic and Information Theory Techniques to Reduce Large Datasets and Detect Cyberattacks in Ambient Intelligence Environments , 2018, IEEE Access.
[28] Miguel A. Labrador,et al. HR-Auth: Heart Rate Data Authentication Using Consumer Wearables , 2018, 2018 IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft).
[29] Borja Bordel,et al. A Robust Implementation of a Chaotic Cryptosystem for Streaming Communications in Wireless Sensor Networks , 2017, WorldCIST.
[30] Wenshan Wang,et al. A data authentication scheme for UAV ad hoc network communication , 2017, The Journal of Supercomputing.
[31] Mostafa Azizi,et al. Analysis of Quantum Cryptography Protocols by Model Checking , 2010 .
[32] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[33] Jun-Zhao Sun,et al. Adaptive Determination of Data Granularity for QoS-Constraint Data Gathering in Wireless Sensor Networks , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[34] Ljiljana Brankovic,et al. PRIVACY ISSUES IN KNOWLEDGE DISCOVERY AND DATA MINING , 2000 .
[35] Borja Bordel,et al. Service management in virtualization-based architectures for 5G systems with network slicing , 2020, Integr. Comput. Aided Eng..
[36] William H. Robinson,et al. A one Zener diode, one memristor crossbar architecture for a write-time-based PUF , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).
[37] Amir Akhavan,et al. A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .
[38] Borja Bordel,et al. An Inter-slice Management Solution for Future Virtualization-Based 5G Systems , 2019, AINA.
[39] Jin Wang,et al. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[40] L. Javier García-Villalba,et al. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things , 2016, Sensors.
[41] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[42] Borja Bordel,et al. Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things , 2017, Pervasive Mob. Comput..
[43] David E. Culler,et al. Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.
[44] V. Kavitha,et al. Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop , 2017, Future Gener. Comput. Syst..
[45] Ruisong Ye,et al. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .
[46] Yong Bai,et al. The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things , 2017, J. Electr. Comput. Eng..
[47] Diego Sánchez de Rivera,et al. Using 5G Technologies in the Internet of Things Handovers, Problems and Challenges , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[48] Safya Belghith,et al. A commercial application of a chaos-based-stream cipher: Performance and Security analysis , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[49] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[50] Marta Z. Kwiatkowska,et al. PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.
[51] Borja Bordel,et al. An Intra-slice Chaotic-Based Security Solution for Privacy Preservation in Future 5G Systems , 2018, WorldCIST.
[52] Shiguo Lian,et al. Security Analysis of A Chaos-based Image Encryption Algorithm , 2005, ArXiv.