Security and Privacy Challenges in the Internet of Things
暂无分享,去创建一个
[1] Karl Aberer,et al. A middleware for fast and flexible sensor network deployment , 2006, VLDB.
[2] Frederick Reiss,et al. Design Considerations for High Fan-In Systems: The HiFi Approach , 2005, CIDR.
[3] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[4] Martina Zitterbart,et al. Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.
[5] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[6] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[7] Srinivasan Seshan,et al. IrisNet: An Architecture for a Worldwide Sensor Web , 2003, IEEE Pervasive Comput..
[8] M. La Civita,et al. AWARE: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator networks cooperating with unmanned AeRial vehiclEs , 2007, 2007 IEEE International Workshop on Safety, Security and Rescue Robotics.
[9] Roberto Di Pietro,et al. Information Confinement, Privacy, and Security in RFID Systems , 2007, ESORICS.
[10] Gabriel Montenegro,et al. Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.
[11] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[12] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[13] Ibrahim Kamel,et al. On protecting the integrity of sensor data , 2008, 2008 15th IEEE International Conference on Electronics, Circuits and Systems.
[14] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[15] Jaecheol Ryou,et al. What Are Possible Security Threats in Ubiquitous Sensor Network Environment? , 2007, APNOMS.
[16] James A. Hendler,et al. Information accountability , 2008, CACM.
[17] Perri. The future of privacy , 1998 .