Analysis of Lightweight Encryption Scheme for Fog-to-Things Communication
暂无分享,去创建一个
[1] Naveen K. Chilamkurti,et al. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.
[2] Vinod Vaikuntanathan,et al. Fast Proxy Re-Encryption for Publish/Subscribe Systems , 2017, IACR Cryptol. ePrint Arch..
[3] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[4] You-Jin Song,et al. Secure Data Sharing based on Proxy Re-encryption in Fog Computing Environment , 2016 .
[5] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[6] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[7] Ivan Stojmenovic,et al. An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..
[8] Sandeep S. Kumar,et al. Elliptic Curve Cryptography for Constrained Devices , 2008 .
[9] Prakash Veeraraghavan,et al. Elliptic Curve Based Cybersecurity Schemes for Publish-Subscribe Internet of Things , 2016, QSHINE.
[10] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[11] Manjusha Pandey,et al. Distributed Denial of Service Attacks: A Review , 2014 .
[12] Zhiwei Wang. Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing , 2018, Future Gener. Comput. Syst..
[13] Naveen Chilamkurti,et al. Differential flow space allocation scheme in SDN based fog computing for IoT applications , 2018 .
[14] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[15] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[16] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[17] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[18] Ivan Stojmenovic,et al. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[19] John McCumber. Assessing and Managing Security Risk in IT Systems: A Structured Methodology , 2004 .
[20] Susan Hohenberger,et al. Key-Private Proxy Re-encryption , 2009, CT-RSA.
[21] Marthony Taguinod,et al. Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).
[22] Maged Hamada Ibrahim,et al. Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..