Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud
暂无分享,去创建一个
[1] S. M. Chen,et al. Cryptanalysis on the RFID ACTION Protocol , 2011 .
[2] Xiaomei Wang,et al. SQL Injections through Back-End of RFID System , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.
[3] Jong Hyuk Park,et al. ALCA: agent learning–based clustering algorithm in vehicular ad hoc networks , 2012, Personal and Ubiquitous Computing.
[4] Robert Simon Sherratt,et al. Enhanced three-factor security protocol for consumer USB mass storage devices , 2014, IEEE Transactions on Consumer Electronics.
[5] Zhu Han,et al. Coalition Formation Games for Distributed Cooperation Among Roadside Units in Vehicular Networks , 2010, IEEE Journal on Selected Areas in Communications.
[6] Joel J. P. C. Rodrigues,et al. An intelligent approach for building a secure decentralized public key infrastructure in VANET , 2015, J. Comput. Syst. Sci..
[7] Athanasios V. Vasilakos,et al. Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..
[8] Sudip Misra,et al. LACAV: an energy-efficient channel assignment mechanism for vehicular ad hoc networks , 2011, The Journal of Supercomputing.
[9] Tingwen Huang,et al. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..
[10] Naveen K. Chilamkurti,et al. Learning Automata-based Opportunistic Data Aggregation and Forwarding scheme for alert generation in Vehicular Ad Hoc Networks , 2014, Comput. Commun..
[11] Morshed U. Chowdhury,et al. Mutual authentication with malware protection for a RFID system , 2010, ICIT 2010.
[12] Athanasios V. Vasilakos,et al. The use of learning algorithms in ATM networks call admission control problem: a methodology , 2000, Comput. Networks.
[13] Yunhao Liu,et al. ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.
[14] Jemal H. Abawajy,et al. Scalable RFID security framework and protocol supporting Internet of Things , 2014, Comput. Networks.
[15] Ming-Hour Yang,et al. Secure multiple group ownership transfer protocol for mobile RFID , 2012, Electron. Commer. Res. Appl..
[16] Andrew H. Sung,et al. SQL infections through RFID , 2007, Journal in Computer Virology.
[17] Nei Kato,et al. GT-CFS: A Game Theoretic Coalition Formulation Strategy for Reducing Power Loss in Micro Grids , 2014, IEEE Transactions on Parallel and Distributed Systems.
[18] Hung-Min Sun,et al. CRFID: An RFID system with a cloud database as a back-end server , 2014, Future Gener. Comput. Syst..
[19] Zahir Tari,et al. CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living , 2014, Future Gener. Comput. Syst..
[20] Athanasios V. Vasilakos,et al. A new approach to the design of reinforcement schemes for learning automata: Stochastic estimator learning algorithm , 1995, Neurocomputing.
[21] Elisa Bertino,et al. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.
[22] Joel J. P. C. Rodrigues,et al. Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud , 2015, Future Gener. Comput. Syst..
[23] Dusit Niyato,et al. Coalition-Based Cooperative Packet Delivery under Uncertainty: A Dynamic Bayesian Coalitional Game , 2013, IEEE Transactions on Mobile Computing.
[24] Mohammad Reza Meybodi,et al. Mobility-based multicast routing algorithm for wireless mobile Ad-hoc networks: A learning automata approach , 2010, Comput. Commun..
[25] Levente Buttyán,et al. Group-Based Private Authentication , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[26] Naveen K. Chilamkurti,et al. Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment , 2016, IEEE Transactions on Dependable and Secure Computing.
[27] V. Potdar,et al. Recovering and Restoring Tampered RFID Data using Steganographic Principles , 2006, 2006 IEEE International Conference on Industrial Technology.
[28] Jemal H. Abawajy,et al. Securing RFID Systems from SQLIA , 2011, ICA3PP.
[29] Joel J. P. C. Rodrigues,et al. Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach , 2015, IEEE Transactions on Intelligent Transportation Systems.
[30] Mohammad S. Obaidat,et al. Networks of learning automata for the vehicular environment: a performance analysis study , 2014, IEEE Wireless Communications.
[31] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[32] Naveen K. Chilamkurti,et al. Bayesian coalition game for the internet of things: an ambient intelligence-based evaluation , 2015, IEEE Communications Magazine.
[33] Naveen K. Chilamkurti,et al. Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..
[34] Athanasios V. Vasilakos,et al. On the Partially Overlapped Channel Assignment on Wireless Mesh Network Backbone: A Game Theoretic Approach , 2012, IEEE Journal on Selected Areas in Communications.
[35] Jongsung Kim,et al. ELACCA: Efficient Learning Automata Based Cell Clustering Algorithm for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[36] Naveen K. Chilamkurti,et al. Bayesian Coalition Game as-a-Service for Content Distribution in Internet of Vehicles , 2014, IEEE Internet of Things Journal.
[37] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[38] Laurence T. Yang,et al. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.
[39] Ivan Stojmenovic,et al. GTES: An Optimized Game-Theoretic Demand-Side Management Scheme for Smart Grid , 2014, IEEE Systems Journal.
[40] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[41] Xun Xu,et al. Development of a Hybrid Manufacturing Cloud , 2014 .
[42] Haohong Wang,et al. Toward Blind Scheduling in Mobile Media Cloud: Fairness, Simplicity, and Asymptotic Optimality , 2013, IEEE Transactions on Multimedia.
[43] Jemal H. Abawajy. SQLIA detection and prevention approach for RFID systems , 2013, J. Syst. Softw..
[44] Mohsen Guizani,et al. Exploring blind online scheduling for mobile cloud multimedia services , 2013, IEEE Wireless Communications.
[45] Mohammad S. Obaidat,et al. Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks , 2015, IEEE Systems Journal.
[46] Chris J. Mitchell,et al. RFID authentication protocol for low-cost tags , 2008, WiSec '08.