Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services
暂无分享,去创建一个
[1] Louis Coetzee,et al. The Internet of Things - promise for the future? An introduction , 2011, 2011 IST-Africa Conference Proceedings.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[4] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Amardeo Sarma,et al. Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..
[6] Stefan BrandsCWI,et al. Untraceable Oo-line Cash in Wallets with Observers , 1993 .
[7] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[8] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[9] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[10] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.