An Improvised Framework for Privacy Preservation in IoT
暂无分享,去创建一个
[1] Mohammad Hayajneh,et al. Data Management for the Internet of Things: Design Primitives and Solution , 2013, Sensors.
[2] Sarah Spiekermann,et al. Maintaining Privacy in RFID Enabled Environments , 2005 .
[3] Philip J. Guo,et al. Towards Practical Incremental Recomputation for Scientists: An Implementation for the Python Language , 2010, TaPP.
[4] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[5] Jiming Chen,et al. Smart community: an internet of things application , 2011, IEEE Communications Magazine.
[6] Mikhail J. Atallah,et al. Privacy-preserving location-dependent query processing , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..
[7] Yue Li,et al. Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[8] Guy Pujolle,et al. An Autonomic-oriented Architecture for the Internet of Things , 2006, IEEE John Vincent Atanasoff 2006 International Symposium on Modern Computing (JVA'06).
[9] Jianqing Zhang,et al. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).
[10] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[11] Bo Dong,et al. Privacy-Preserving Channel Access for Internet of Things , 2014, IEEE Internet of Things Journal.
[12] Wenliang Du,et al. Privacy-preserving collaborative filtering using randomized perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[13] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[14] Soma Bandyopadhyay,et al. Negotiation-based privacy preservation scheme in internet of things platform , 2012, SecurIT '12.
[15] Claude Castelluccia,et al. Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.
[16] Vlad Trifa,et al. SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.
[17] Yannick Chevalier,et al. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols , 2004 .
[18] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[19] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[20] M F Sanner,et al. Python: a programming language for software integration and development. , 1999, Journal of molecular graphics & modelling.
[21] Gurpreet Singh Matharu,et al. The Internet of Things: Challenges & security issues , 2014, 2014 International Conference on Emerging Technologies (ICET).
[22] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[23] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.