Generic Framework for Privacy Preservation in Cyber-Physical Systems
暂无分享,去创建一个
[1] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[2] Muzzammil Hussain,et al. Framework for privacy preservation in iot through classification and access control mechanisms , 2017, 2017 2nd International Conference for Convergence in Technology (I2CT).
[3] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[4] Mohammad Abdullah Al Faruque,et al. A model-based design of Cyber-Physical Energy Systems , 2014, 2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC).
[5] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Mohsen Guizani,et al. Securing Cognitive Radio Networks against Primary User Emulation Attacks , 2016, IEEE Network.
[7] Moad Yassin Mowafi,et al. Use of elliptic curve cryptography for multimedia encryption , 2013, IET Inf. Secur..
[8] Costas J. Spanos,et al. A Framework for Privacy-Preserving Data Publishing with Enhanced Utility for Cyber-Physical Systems , 2018, ACM Trans. Sens. Networks.
[9] Syed Mahfuzul Aziz,et al. Sensor Anomaly Detection in Wireless Sensor Networks for Healthcare , 2015, Sensors.
[10] Ramjee Prasad,et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[11] Liang Hu,et al. Review of Cyber-Physical System Architecture , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.
[12] Florian Kerschbaum,et al. Privacy-Preserving Observation in Public Spaces , 2015, ESORICS.
[13] Edward Griffor,et al. Framework for Cyber-Physical Systems: Volume 1, Overview , 2017 .
[14] Do van Thuan,et al. A User Centric Identity Management for Internet of Things , 2014, 2014 International Conference on IT Convergence and Security (ICITCS).
[15] Edmundo Monteiro,et al. Security Issues and Approaches on Wireless M2M Systems , 2013, Wireless Networks and Security.
[16] Jiming Chen,et al. Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.
[17] Jiankun Hu,et al. An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems , 2019, IEEE Transactions on Sustainable Computing.
[18] Qun Li,et al. Distributed User Access Control in Sensor Networks , 2006, DCOSS.