A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-health
暂无分享,去创建一个
Leïla Azouz Saïdane | Balkis Hamdane | Mohamed Elhoucine Elhdhili | Rihab Boussada | Soumaya Argoubi
[1] Giuseppe Piro,et al. Information centric services in Smart Cities , 2014, J. Syst. Softw..
[2] Deborah Estrin,et al. Named Data Networking (NDN) Project , 2010 .
[3] Leïla Azouz Saïdane,et al. Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[4] Alexander Afanasyev,et al. ndnSIM 2 . 0 : A new version of the NDN simulator for NS-3 , 2015 .
[5] Gene Tsudik,et al. ANDaNA: Anonymous Named Data Networking Application , 2011, NDSS.
[6] Yonggang Wen,et al. Towards name-based trust and security for content-centric network , 2011, 2011 19th IEEE International Conference on Network Protocols.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Shuang Li,et al. Identity Authentication and Context Privacy Preservation in Wireless Health Monitoring System , 2011 .
[9] Leïla Azouz Saïdane,et al. Privacy Preserving Solution for Internet of Things with Application to eHealth , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).
[10] Athanasios V. Vasilakos,et al. Information-centric networking for the internet of things: challenges and opportunities , 2016, IEEE Network.
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] Xiaodong Lin,et al. Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.
[13] Leila Azouz Saidane,et al. QoS enabled privacy preserving solution for eHealth systems , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).
[14] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[15] Leïla Azouz Saïdane,et al. A survey on privacy: Terminology, mechanisms and attacks , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).