Security, Privacy, and Trust on Internet of Things
暂无分享,去创建一个
Georgios Kambourakis | Constantinos Kolias | Weizhi Meng | Jiageng Chen | Jiageng Chen | G. Kambourakis | C. Kolias | W. Meng
[1] Toru Fujiwara,et al. On the Security of Tag-KEM for Signcryption , 2007, Electron. Notes Theor. Comput. Sci..
[2] Jianer Chen,et al. Security from the transparent computing aspect , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[3] Xiaolei Dong,et al. PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.
[4] Aaditya Jain,et al. Solutions for Secure Routing in Mobile Ad Hoc Network (MANET): A Survey , 2016 .
[5] Igor V. Kotenko,et al. Computer attack modeling and security evaluation based on attack graphs , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).
[6] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[7] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[8] Haider Abbas,et al. A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata , 2013, J. Netw. Comput. Appl..
[9] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[10] Kehua Guo,et al. Transparent Computing: A Promising Network Computing Paradigm , 2017, Computing in Science & Engineering.
[11] R. S. Ponmagal,et al. Design and Development of Secure Cloud Architecture for Sensor Services , 2015, ICDCIT.
[12] Daniel Díaz López,et al. Dynamic counter-measures for risk-based access control systems: An evolutive approach , 2016, Future Gener. Comput. Syst..
[13] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[14] Abdelmalek Azizi,et al. Internet of things security , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[15] Sarah Abdallah,et al. Identity-based authentication scheme for the Internet of Things , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[16] Abdelhamid Belmekki,et al. Privacy Preservation in the Internet of Things , 2016, UNet.
[17] George Yee. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards , 2011 .
[18] Chin-Laung Lei,et al. Attribute-based Encryption , 2015 .
[19] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[20] Flora Malamateniou,et al. Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).
[21] Xiaohui Liang,et al. PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..
[22] Yi Mu,et al. Comments on a Public Auditing Mechanism for Shared Cloud Data Service , 2015, IEEE Transactions on Services Computing.
[23] Chin-Ling Chen,et al. A Privacy Authentication Scheme Based on Cloud for Medical Environment , 2014, Journal of Medical Systems.
[24] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[25] Randal C. Burns,et al. Secure deletion for a versioning file system , 2005, FAST'05.
[26] Muhammad Sher,et al. A survey of dynamic replication strategies for improving data availability in data grids , 2012, Future Gener. Comput. Syst..
[27] Xiaolei Dong,et al. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..
[28] Kire Trivodaliev,et al. Internet of Things Framework for Home Care Systems , 2017, Wirel. Commun. Mob. Comput..
[29] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[30] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[31] M. Shamim Hossain,et al. A Survey on Sensor-Cloud: Architecture, Applications, and Approaches , 2013, Int. J. Distributed Sens. Networks.
[32] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[33] Stephan U Dombrowski,et al. Using Smartphones and Health Apps to Change and Manage Health Behaviors: A Population-Based Survey , 2017, Journal of medical Internet research.
[34] Kumar Yelamarthi,et al. Internet of Things (IoT) Platform for Structure Health Monitoring , 2017, Wirel. Commun. Mob. Comput..
[35] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[36] Georgios Kambourakis,et al. Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks , 2018, IEEE Communications Surveys & Tutorials.
[37] Ji Zhang,et al. A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing , 2017, Cluster Computing.
[38] Rafael Dowsley,et al. MARS: Monetized Ad-hoc Routing System (A Position Paper) , 2018, CRYBLOCK@MobiSys.
[39] Dawn Song,et al. Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.
[40] Richard J. Lipton,et al. A Revocable Backup System , 1996, USENIX Security Symposium.
[41] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[42] Yuji Yamaoka,et al. IoT Security for Utilization of Big Data : Mutual Authentication Technology and Anonymization Technology for Positional Data , 2016 .
[43] Aggelos Kiayias,et al. The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.
[44] Thomas C. Schmidt,et al. RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[45] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[46] 10 emerging technologies that will change your world , 2004, IEEE Engineering Management Review.
[47] Antti Ruhanen,et al. Embedded passive UHF RFID seal tag for metallic returnable transit items , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).
[48] Asan,et al. Sequencing of 50 Human Exomes Reveals Adaptation to High Altitude , 2010, Science.
[49] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[50] Prateek Saxena,et al. Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..
[51] Michael G. Bailey,et al. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems , 2004, CITC5 '04.
[52] Weimin Li,et al. A Resource Service Model in the Industrial IoT System Based on Transparent Computing , 2018, Sensors.
[53] Michael Z. Newman. Crazy Ex-Girlfriend , 2016 .
[54] Jin Kwak,et al. Smart card-based secure authentication protocol in multi-server IoT environment , 2017, Multimedia Tools and Applications.
[55] Farrukh Nadeem,et al. An Early Evaluation and Comparison of Three Private Cloud Computing Software Platforms , 2015, Journal of Computer Science and Technology.
[56] Athanasios V. Vasilakos,et al. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..
[57] Anton O. Prokofiev,et al. A method to detect Internet of Things botnets , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[58] Thorben Keller,et al. Using low-level reader data to detect false-positive RFID tag reads , 2010, 2010 Internet of Things (IOT).
[59] Jan Sliwa. A Generalized Framework for Multi-party Data Exchange for IoT Systems , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).
[60] Yong Ho Hwang. IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.
[61] Peter Robinson,et al. OpenFace: An open source facial behavior analysis toolkit , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).
[62] Yves-Alexandre de Montjoye,et al. Computational privacy : towards privacy-conscientious uses of metadata , 2015 .
[63] Samee Ullah Khan,et al. e-Health Cloud: Privacy Concerns and Mitigation Strategies , 2015, Medical Data Privacy Handbook.
[64] Nicolas Herbaut,et al. A Model for Collaborative Blockchain-Based Video Delivery Relying on Advanced Network Services Chains , 2017, IEEE Communications Magazine.
[65] Mauro Conti,et al. RPiDS: Raspberry Pi IDS — A Fruitful Intrusion Detection System for IoT , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[66] Srinivasan Seshan,et al. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.
[67] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[68] Klaus Wehrle,et al. A Cloud design for user-controlled storage and processing of sensor data , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[69] Bruno Schulze,et al. An Analysis of Public Clouds Elasticity in the Execution of Scientific Applications: a Survey , 2016, Journal of Grid Computing.
[70] Shiva Prakash,et al. Hybrid Cryptography for Secure Data Communication in Wireless Sensor Networks , 2018 .
[71] Georgios Kambourakis,et al. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs , 2011, IEEE Communications Surveys & Tutorials.
[72] Rajesh Yerneni,et al. Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[73] Laurence T. Yang,et al. Information security underlying transparent computing: Impacts, visions and challenges , 2010, Web Intell. Agent Syst..
[74] Hiroki Watanabe,et al. The Blockchain-Based Digital Content Distribution System , 2015, 2015 IEEE Fifth International Conference on Big Data and Cloud Computing.
[75] Guangjie Han,et al. Analysis of Energy-Efficient Connected Target Coverage Algorithms for Industrial Wireless Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.
[76] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[77] Klaus Wehrle,et al. A comprehensive approach to privacy in the cloud-based Internet of Things , 2016, Future Gener. Comput. Syst..
[78] E. Baburaj,et al. An efficient secure authentication on cloud based e-health care system in WBAN , 2016 .
[79] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[80] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[81] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[82] Nabil Bouzerna,et al. Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[83] Madoka Yuriyama,et al. Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[84] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[85] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[86] Junji Shikata,et al. Lattice-Based Signcryption Without Random Oracles , 2018, PQCrypto.
[87] Farshad Firouzi,et al. Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics , 2018, Future Gener. Comput. Syst..
[88] Hideki Imai,et al. Compact and unforgeable key establishment over an ATM network , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[89] Sayantani Saha. Secure sensor data management model in a sensor - cloud integration environment , 2015, 2015 Applications and Innovations in Mobile Computing (AIMoC).
[90] Murizah Kassim,et al. Mobile ad hoc network (MANET) routing protocols comparison for wireless sensor network , 2011, 2011 IEEE International Conference on System Engineering and Technology.
[91] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[92] Mireille Hildebrandt,et al. Defining Profiling: A New Type of Knowledge? , 2008, Profiling the European Citizen.
[93] Cesare Pautasso,et al. The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).
[94] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[95] Nitin Pandey,et al. Enhancement of security using cryptographic techniques , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).
[96] Alessandro Soro,et al. Minding the Gap: Reconciling Human and Technical Perspectives on the IoT for Healthy Ageing , 2017, Wirel. Commun. Mob. Comput..
[97] Yan Fu,et al. Short Signcryption Scheme for the Internet of Things , 2011, Informatica.
[98] Jaimin Patel. Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing , 2017 .
[99] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[100] Yacine Challal,et al. Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[101] Kui Ren,et al. Attribute-based fine-grained access control with efficient revocation in cloud storage systems , 2013, ASIA CCS '13.
[102] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[103] Helen J. Wang,et al. SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser , 2015, 2015 IEEE Symposium on Security and Privacy.
[104] Nick Feamster,et al. A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.
[105] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[106] Robert H. Deng,et al. Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.
[107] Matthew Louis Mauriello,et al. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns , 2016, Future Internet.
[108] Ricardo Neisse,et al. Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[109] Yacine Challal,et al. Energy efficiency in wireless sensor networks: A top-down survey , 2014, Comput. Networks.
[110] Yixian Yang,et al. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities , 2017, Secur. Commun. Networks.
[111] Xuemin Shen,et al. Security and privacy in mobile crowdsourcing networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[112] Peter M. A. Sloot,et al. eHealth in the future of medications management: personalisation, monitoring and adherence , 2017, BMC Medicine.
[113] Xiaohui Liang,et al. ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.
[114] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[115] Mahadev Satyanarayanan,et al. A Scalable and Privacy-Aware IoT Service for Live Video Analytics , 2017, MMSys.
[116] Samaher Al-Janabi,et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .
[117] Rasool Jalili,et al. Alert Correlation Algorithms: A Survey and Taxonomy , 2013, CSS.
[118] Alexander W. Dent,et al. Building Better Signcryption Schemes with Tag-KEMs , 2006, Public Key Cryptography.
[119] Zhou Cai-xue. Improved certificateless hybrid signcryption scheme , 2013 .
[120] Yang Hua-jie. RBIS: Security Enhancement for MRBP and MRBP2 Using Integrity Check , 2007 .
[121] Dengguo Feng,et al. Efficiently Attribute-Based Access Control for Mobile Cloud Storage System , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[122] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[123] B. Latha,et al. HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks , 2017, Cluster Computing.
[124] Min Chen,et al. Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing , 2020, IEEE Transactions on Cloud Computing.
[125] Anas Abou El Kalam,et al. SmartOrBAC security and privacy in the Internet of Things , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[126] Anton Vedder,et al. KDD: The challenge to individualism , 1999, Ethics and Information Technology.
[127] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[128] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[129] Mehdi Hosseinzadeh,et al. Correction to: A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks , 2019, Peer Peer Netw. Appl..
[130] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[131] P. Khatri,et al. A Survey on Security issues in Mobile ADHOC networks , 2009 .
[132] Vincent Zimmer. Platform Trust Beyond BIOS Using the Unified Extensible Firmware Interface , 2007, Security and Management.
[133] Bart Custers,et al. Effects of Unreliable Group Profiling by Means of Data Mining , 2003, Discovery Science.
[134] Jian Shen,et al. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services , 2018, IEEE Systems Journal.
[135] Andrei V. Gurtov,et al. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.
[136] Yaoxue Zhang,et al. Block-Stream as a Service: A More Secure, Nimble, and Dynamically Balanced Cloud Service Model for Ambient Computing , 2018, IEEE Network.
[137] Jee Hea An. Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses , 2001, IACR Cryptol. ePrint Arch..
[138] Maria Fazio,et al. Are Next-Generation Sequencing Tools Ready for the Cloud? , 2017, Trends in biotechnology.
[139] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[140] Fagen Li,et al. Certificateless hybrid signcryption , 2009, Math. Comput. Model..
[141] Javier López,et al. NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.
[142] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[143] Mahadev Satyanarayanan,et al. Privacy Mediators: Helping IoT Cross the Chasm , 2016, HotMobile.
[144] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[145] Frank Kargl,et al. KopperCoin - A Distributed File Storage with Financial Incentives , 2016, ISPEC.
[146] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[147] Alex Biryukov,et al. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay , 2015, Financial Cryptography.
[148] Satyen Abrol,et al. Data Security and Privacy , 2016 .
[149] Jonathan Katz,et al. Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..
[150] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM , 2005, EUROCRYPT.
[151] Jinyong Chang,et al. The ECCA Security of Hybrid Encryptions , 2017, ISPEC.
[152] Abdelfettah Belghith,et al. Wireless Body Area Networks: Applications and Technologies , 2016, ANT/SEIT.
[153] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[154] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[155] Marc Langheinrich,et al. A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.
[156] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[157] Eric Gossett,et al. Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2015 .
[158] Tsuyoshi Murata,et al. {m , 1934, ACML.
[159] Aruna Seneviratne,et al. A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain , 2018, IEEE Access.
[160] Miao Yun,et al. Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid , 2010, 2010 International Conference on Advances in Energy Engineering.
[161] Junji Shikata,et al. Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption , 2013, IMACC.
[162] Georgios Kambourakis,et al. Cybertrust in the IoT Age , 2018, Computer.
[163] Ju Ren,et al. Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.
[164] James R. Larus,et al. Imagining the Future: Thoughts on Computing , 2012, Computer.
[165] Erik Poll,et al. Using Trusted Execution Environments in Two-factor Authentication: comparing approaches , 2013, Open Identity Summit.
[166] Xiaojiang Du,et al. Achieving Secure and Efficient Data Access Control for Cloud-Integrated Body Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[167] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[168] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[169] Wu Ming. Analysis and a case study of transparent computing implementation with UEFI , 2012, Int. J. Cloud Comput..
[170] Wenyong Wang,et al. Aya: “An efficient access-controlled storage and processing for cloud-based sensed data” , 2015, 2015 12th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP).
[171] Masooda Bashir,et al. The onion router: Understanding a privacy enhancing technology community , 2016, ASIST.
[172] Yu-Hung Huang,et al. A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).
[173] Sangeeta Sharma,et al. The Evolution of RFID Security and Privacy: A Research Survey , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[174] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[175] William C. Chu,et al. Privacy Preservation in Affect-Driven Personalization , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[176] Hongli Zhang,et al. An Efficient Security System for Mobile Data Monitoring , 2018, Wirel. Commun. Mob. Comput..
[177] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[178] Srdjan Capkun,et al. Secure Time Synchronization in Sensor Networks , 2008, TSEC.
[179] Chien-Ding Lee,et al. A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations , 2008, IEEE Transactions on Information Technology in Biomedicine.
[180] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[181] Maryline Laurent-Maknavicius,et al. Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[182] Sudheendra Hangal,et al. PrPl: a decentralized social networking infrastructure , 2010, MCS '10.
[183] Walid Saad,et al. On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[184] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.
[185] Gal Shpantzer,et al. Implementing Hardware Roots of Trust : The Trusted Platform Module Comes of Age , 2013 .
[186] Maxim O. Kalinin,et al. Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing , 2016, SIN.
[187] J. Voelcker,et al. Stalked by satellite - an alarming rise in GPS-enabled harassment , 2006, IEEE Spectrum.
[188] Amit P. Sheth,et al. Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems , 2018, IEEE Internet Computing.
[189] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[190] Gus Hosein,et al. They Know Where You Are , 2007 .
[191] Andrew M. Odlyzko,et al. Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.
[192] Georgios Kambourakis,et al. The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[193] Padinjappurathu Shynu,et al. An Enhanced ABE based Secure Access Control Scheme for E-health Clouds , 2017 .
[194] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[195] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[196] Ju Ren,et al. BOAT: A Block-Streaming App Execution Scheme for Lightweight IoT Devices , 2018, IEEE Internet of Things Journal.
[197] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[198] Markus Endler,et al. A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).
[199] Mohsen Guizani,et al. The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.
[200] Luca Lombardi,et al. Challenges for Data Mining in Distributed Sensor Networks , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[201] Fagen Li,et al. An efficient signcryption for data access control in cloud computing , 2017, Computing.
[202] Yongli Wang,et al. Privacy management of patient physiological parameters , 2018, Telematics Informatics.
[203] Rajkumar Buyya,et al. Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.
[204] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[205] Ju Ren,et al. A scalable and manageable IoT architecture based on transparent computing , 2017, J. Parallel Distributed Comput..
[206] Mohd Aizaini Maarof,et al. Secure searchable based asymmetric encryption in cloud computing , 2013 .
[207] Hoh Peter In,et al. A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..
[208] Ratnamala Prakash More,et al. A Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment , 2016 .
[209] Simon Duquennoy,et al. Towards Blockchain-based Auditable Storage and Sharing of IoT Data , 2017, CCSW.
[210] Zhetao Li,et al. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[211] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[212] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[213] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[214] W. Marsden. I and J , 2012 .
[215] Susana Alcalde Bagüés,et al. Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing , 2007 .
[216] Kan Siew Leong,et al. A secure multi-hop routing for IoT communication , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[217] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[218] Igor V. Kotenko,et al. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[219] Sarmistha Neogy,et al. A cloud security framework for a data centric WSN application , 2016, ICDCN.
[220] Félix Gómez Mármol,et al. I Don't Trust ICT: Research Challenges in Cyber Security , 2016, IFIPTM.
[221] Victor Shoup,et al. On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..
[222] Franz J. Hauck,et al. Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[223] Richard G Baraniuk,et al. More Is Less: Signal Processing and the Data Deluge , 2011, Science.
[224] Georgios Kambourakis,et al. Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[225] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[226] Christo El Morr,et al. Using Mobile Health to Enhance Outcomes of Noncommunicable Diseases Care in Rural Settings and Refugee Camps: Randomized Controlled Trial , 2018, JMIR mHealth and uHealth.
[227] Goichiro Hanaoka,et al. Applications of Signcryption , 2010, Practical Signcryption.
[228] Keshav P. Dahal,et al. Toward Anonymizing IoT Data Streams via Partitioning , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).
[229] Kishor S. Trivedi,et al. Software aging in the eucalyptus cloud computing infrastructure , 2014, ACM J. Emerg. Technol. Comput. Syst..
[230] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[231] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[232] Dong Yang,et al. TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[233] Yang Wang,et al. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.
[234] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[235] Lei Zhou,et al. Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).
[236] Vern Paxson,et al. The Matter of Heartbleed , 2014, Internet Measurement Conference.
[237] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[238] Rogério Schmidt Feris,et al. Video analytics for retail , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.
[239] Yacine Challal,et al. Healing on the cloud: Secure cloud architecture for medical wireless sensor networks , 2016, Future Gener. Comput. Syst..
[240] Yuan Chen,et al. RCCA Security for KEM+DEM Style Hybrid Encryptions , 2012, Inscrypt.
[241] Nikos Fotiou,et al. Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[242] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[243] Stuti Gupta,et al. Vulnerable network analysis using war driving and security intelligence , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[244] Kim-Kwang Raymond Choo,et al. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.
[245] Jiannong Cao,et al. OSR: Optimal and Secure Routing Protocol in Multi-hop Wireless Networks , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[246] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[247] Ting Yu,et al. What are customers looking at? , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.
[248] Antônio A. de A. Rocha,et al. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.
[249] Kim-Kwang Raymond Choo,et al. A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.
[250] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[251] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[252] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[253] Victor C. M. Leung,et al. Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT , 2015, IEEE Access.
[254] Evangelos P. Markatos,et al. A Generic Anonymization Framework for Network Traffic , 2006, 2006 IEEE International Conference on Communications.
[255] Ali Daud,et al. Corrigendum to "Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure" , 2019, Wirel. Commun. Mob. Comput..