An IoT Data Communication Framework for Authenticity and Integrity
暂无分享,去创建一个
Xin Li | Ye Yu | Chen Qian | Huazhe Wang | Xin Li | Chen Qian | Ye Yu | Huazhe Wang
[1] Jeffrey Scott Vitter,et al. Random sampling with a reservoir , 1985, TOMS.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Graham Cormode,et al. Sampling for big data: a tutorial , 2014, KDD.
[4] Li Lin,et al. Smart Meters in Smart Grid: An Overview , 2013, 2013 IEEE Green Technologies Conference (GreenTech).
[5] Christian Decker,et al. goProbe: a scalable distributed network monitoring solution , 2015, 2015 IEEE International Conference on Peer-to-Peer Computing (P2P).
[6] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[7] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[8] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[9] Ch. Ramesh Babu,et al. Internet of Vehicles: From Intelligent Grid to Autonomous Cars and Vehicular Clouds , 2016 .
[10] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[11] Qin Zhang,et al. Continuous sampling from distributed streams , 2012, JACM.
[12] Youngsoo Kim,et al. Design of a fence surveillance system based on wireless sensor networks , 2008, Autonomics.
[13] Lei Zhang,et al. Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[14] Ratul Mahajan,et al. Bolt: Data Management for Connected Homes , 2014, NSDI.
[15] Li Duan,et al. Event-Driven SOA for IoT Services , 2014, 2014 IEEE International Conference on Services Computing.
[16] Ratul Mahajan,et al. Digital neighborhood watch: investigating the sharing of camera data amongst neighbors , 2013, CSCW.
[17] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[18] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[19] K. Hata,et al. A stretchable carbon nanotube strain sensor for human-motion detection. , 2011, Nature nanotechnology.
[20] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[21] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[22] Srinath T. V. Setty,et al. Depot: Cloud Storage with Minimal Trust , 2010, TOCS.
[23] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[24] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[25] John Krumm,et al. PreHeat: controlling home heating using occupancy prediction , 2011, UbiComp '11.