Present Scenarios of IoT Projects with Security Aspects Focused
暂无分享,去创建一个
Xing Li | Aniruddha Bhattacharjya | Xiaofeng Zhong | Jing Wang | Jing Wang | A. Bhattacharjya | Xiaofeng Zhong | Xing Li
[1] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[2] Xiaolin Gui,et al. Research on social relations cognitive model of mobile nodes in Internet of Things , 2013, J. Netw. Comput. Appl..
[3] Shiuh-Pyng Shieh,et al. Emerging Security Threats and Countermeasures in IoT , 2015, AsiaCCS.
[4] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[5] Lingling Gao,et al. A unified perspective on the factors influencing consumer acceptance of internet of things technology , 2014 .
[6] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[7] David M. Eyers,et al. Policy enforcement within emerging distributed, event-based systems , 2014, DEBS '14.
[8] Giuseppe Piro,et al. A standard compliant security framework for IEEE 802.15.4 networks , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[9] Jiang Tao Geng,et al. Research on Mobile Information Access Based on Internet of Things , 2014 .
[10] Jörg Daubert,et al. A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[11] Antonio F. Gómez-Skarmeta,et al. Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture , 2013, Int. J. Ad Hoc Ubiquitous Comput..
[12] Alexandre Santos,et al. Security architecture for mobile e-health applications in medication control , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).
[13] Soma Bandyopadhyay,et al. IoT-Privacy: To be private or not to be private , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[14] Sylvain Kubler,et al. A standardized approach to deal with firewall and mobility policies in the IoT , 2015, Pervasive Mob. Comput..
[15] Luigi Atzori,et al. The problem of task allocation in the Internet of Things and the consensus-based approach , 2014, Comput. Networks.
[16] Jianqing Zhang,et al. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).
[17] Jing Wang,et al. On mapping of address and port using translation , 2019, Int. J. Inf. Comput. Secur..
[18] Young-Sik Jeong,et al. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing , 2014, J. Appl. Math..
[19] Xing Li,et al. Mapping of Address and Port using Translation (MAP-T) , 2015 .
[20] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[21] Xing Li,et al. Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme , 2018 .
[22] Xing Li,et al. Secure IoT Structural Design for Smart Homes , 2019, Smart Cities Cybersecurity and Privacy.
[23] Lilian Bossuet,et al. New paradigms for access control in constrained environments , 2014, 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC).
[24] Ilsun You,et al. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things , 2014, Future Gener. Comput. Syst..
[25] Jing Wang,et al. An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures , 2018, Int. J. Inf. Comput. Secur..
[26] Julita Vassileva,et al. Collaboration technology in teams and organizations: Introduction to the special issue , 2016, Inf. Syst. Frontiers.
[27] Daniele Miorandi,et al. A security-and quality-aware system architecture for Internet of Things , 2014, Information Systems Frontiers.
[28] Ricardo Neisse,et al. Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[29] Yu-Hung Huang,et al. A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).
[30] Mahdi Ben Alaya,et al. Architecting information centric ETSI-M2M systems , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[31] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[32] Kuo-Ching Liu,et al. A privacy and authentication protocol for mobile RFID system , 2014 .
[33] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[34] Félix Gómez Mármol,et al. Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..
[35] Hwa-Young Jeong,et al. Numeric Analysis for Relationship-Aware Scalable Streaming Scheme , 2014, J. Appl. Math..
[36] Cinzia Cappiello,et al. A NFP Model for Internet of Things applications , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[37] Edna Dias Canedo,et al. Proposal of a secure, deployable and transparent middleware for Internet of Things , 2014, CISTI 2014.
[38] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[39] Jing Wang,et al. Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA , 2016, ICC 2016.
[40] Evangelos N. Gazis,et al. Security Perspectives for Collaborative Data Acquisition in the Internet of Things , 2014, IoT360.
[41] Wang Ruchuan,et al. Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things , 2013 .
[42] Bin Sun,et al. Trust management mechanism for Internet of Things , 2014 .
[43] Diego López-de-Ipiña,et al. Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications , 2014, Comput. Hum. Behav..
[44] Cong Wang,et al. Security and privacy mechanism for health internet of things , 2013 .
[45] Peng Gong,et al. A secure handshake scheme for mobile-hierarchy city intelligent transportation system , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).