Attribute Based Content Security and Caching in Information Centric IoT
暂无分享,去创建一个
[1] Meng Zhang,et al. A Survey of Caching Mechanisms in Information-Centric Networking , 2015, IEEE Communications Surveys & Tutorials.
[2] Dijiang Huang,et al. Attribute-based Access Control for ICN Naming Scheme , 2014, IEEE Transactions on Dependable and Secure Computing.
[3] Gürkan Gür. Energy-aware cache management at the wireless network edge for information-centric operation , 2015, J. Netw. Comput. Appl..
[4] Börje Ohlman,et al. Attribute-Based Encryption on a Resource Constrained Sensor in an Information-Centric Network , 2016, ICN.
[5] Nouha Oualha,et al. Lightweight Attribute-Based Encryption for the Internet of Things , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[6] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Sasu Tarkoma,et al. IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[9] Dong Hoon Lee,et al. Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System , 2016, Journal of Medical Systems.
[10] Jianqing Zhang,et al. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).
[11] Tooska Dargahi,et al. On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.
[12] Satyajayant Misra,et al. Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[13] Jianqing Zhang,et al. Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.
[14] Gürkan Gür,et al. Software-Defined Edge Defense Against IoT-Based DDoS , 2017, 2017 IEEE International Conference on Computer and Information Technology (CIT).
[15] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[16] Edith C. H. Ngai,et al. Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context , 2017, 2017 Global Internet of Things Summit (GIoTS).