Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique
暂无分享,去创建一个
[1] Yan Sun,et al. Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..
[2] Slawomir Grzonkowski,et al. Sharing cloud services: user authentication for social enhancement of home networking , 2011, IEEE Transactions on Consumer Electronics.
[3] R. S. Ponmagal,et al. Integration of Wireless Sensor Network with Cloud , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[4] Chih-Yuan Huang,et al. Authentication using graphical password in cloud , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Kakali Chatterjee,et al. A multi-dimensional trust and reputation calculation model for cloud computing environments , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).
[7] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[8] Madoka Yuriyama,et al. Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[9] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[10] Victor C. M. Leung,et al. An evaluation of user importance when integrating social networks and mobile cloud computing , 2014, 2014 IEEE Global Communications Conference.
[11] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[12] Hyotaek Lim,et al. A Strong User Authentication Framework for Cloud Computing , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.
[13] H. A. Dinesha,et al. Multi-dimensional password generation technique for accessing cloud services , 2012, CloudCom 2012.
[14] Mukaddim Pathan,et al. BodyCloud: Integration of Cloud Computing and body sensor networks , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[15] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[16] Sushmita Ruj,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.
[17] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[18] Victor C. M. Leung,et al. An Authenticated Trust and Reputation Calculation , 2017 .
[19] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.