暂无分享,去创建一个
[1] Hwajeong Seo,et al. A High-Speed Public-Key Signature Scheme for 8-b IoT-Constrained Devices , 2020, IEEE Internet of Things Journal.
[2] Keke Gai,et al. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.
[3] Kyung-Ah Shim,et al. A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.
[4] Shahzad A. Malik,et al. Fog/Edge Computing-Based IoT (FECIoT): Architecture, Applications, and Research Issues , 2019, IEEE Internet of Things Journal.
[5] Mritunjay Kumar Rai,et al. Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications , 2019, IEEE Access.
[6] Prem Prakash Jayaraman,et al. Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions , 2018, IEEE Access.
[7] Laurence T. Yang,et al. Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices , 2020, IEEE Transactions on Industrial Informatics.
[8] Yannan Li,et al. Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things , 2018, IEEE Wireless Communications.
[9] Basem Shihada,et al. Blockchain in IoT Systems: End-to-End Delay Evaluation , 2019, IEEE Internet of Things Journal.
[10] PRADIP KUMAR SHARMA,et al. A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.
[11] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[12] Lei Shu,et al. Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design , 2020, IEEE/CAA Journal of Automatica Sinica.
[13] Xiong Luo,et al. A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things , 2018, IEEE Access.
[14] Adam Shostack,et al. Threat Modeling: Designing for Security , 2014 .
[15] Weijun Wang,et al. A Reliability Analysis of CFETR CSMC Heat Treatment System Based on RPN-HAZOP Method , 2020, IEEE Transactions on Plasma Science.
[16] Cheng Li,et al. Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.
[17] Ammar Mohammed Ali,et al. A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document , 2020, IEEE Access.
[18] R. Khondoker,et al. Cyber Security Threat Modeling of A Telesurgery System , 2020, 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI).
[19] Chunhua Su,et al. Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints , 2018, IEEE Signal Processing Magazine.
[20] Amir Herzberg,et al. Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.
[21] Paolo Tasca,et al. Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.
[22] Robert F. Mills,et al. Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study , 2018, IEEE Access.
[23] Fahad Ahmad Al-Zahrani,et al. Subscription-Based Data-Sharing Model Using Blockchain and Data as a Service , 2020, IEEE Access.
[24] Frederick T. Sheldon,et al. Access Control in Fog Computing: Challenges and Research Agenda , 2020, IEEE Access.
[25] Hai Jin,et al. Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT , 2017, IEEE Access.
[26] Kai Chen,et al. Multitier Fog Computing With Large-Scale IoT Data Analytics for Smart Cities , 2018, IEEE Internet of Things Journal.
[27] Sandeep K. Sood,et al. Fog Assisted-IoT Enabled Patient Health Monitoring in Smart Homes , 2018, IEEE Internet of Things Journal.
[28] Tony Ucedavélez,et al. Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis , 2015 .
[29] Michael Mylrea,et al. Evaluation and Demonstration of Blockchain Applicability Framework , 2020, IEEE Transactions on Engineering Management.
[30] Sakir Sezer,et al. STRIDE-based threat modeling for cyber-physical systems , 2017, 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).
[31] Sherali Zeadally,et al. Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions , 2019, IEEE Internet of Things Journal.
[32] Alan Davy,et al. Distributed Decomposed Data Analytics in Fog Enabled IoT Deployments , 2019, IEEE Access.
[33] Jameela Al-Jaroodi,et al. Blockchain in Industries: A Survey , 2019, IEEE Access.
[34] W. Sardjono,et al. Information Systems Risk Analysis Using Octave Allegro Method Based at Deutsche Bank , 2018, 2018 International Conference on Information Management and Technology (ICIMTech).
[35] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[36] Salman A. Khan,et al. A STRIDE Model based Threat Modelling using Unified and-Or Fuzzy Operator for Computer Network Security , 2017 .
[37] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.