Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
暂无分享,去创建一个
[1] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[2] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[3] Lida Xu,et al. Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.
[4] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[5] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[6] Marimuthu Palaniswami,et al. An Information Framework for Creating a Smart City Through Internet of Things , 2014, IEEE Internet of Things Journal.
[7] Hongming Cai,et al. Ontology Combined Structural and Operational Semantics for Resource-Oriented Service Composition , 2013, J. Univers. Comput. Sci..
[8] Jing Yu,et al. A Study on the Fire IOT Development Strategy , 2013 .
[9] Jin Li,et al. Multi-authority fine-grained access control with accountability and its application in cloud , 2018, J. Netw. Comput. Appl..
[10] Ivan Stojmenovic,et al. RFID Systems: Research Trends and Challenges , 2011 .
[11] Huansheng Ning,et al. Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.
[12] Volker Gehrmann,et al. Scientific Workshop 4: Intelligent Objects for the Internet of Things: Internet of Things - Application of Sensor Networks in Logistics , 2008, AmI Workshops.
[13] Dongqing Xie,et al. A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding , 2018, IEEE Access.
[14] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[15] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[16] George K. Karagiannidis,et al. Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.
[17] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[18] Chih-Ming Hsiao,et al. A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols , 2013 .
[19] Alexander Gluhak,et al. A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.
[20] Guopu Zhu,et al. Transportation Spherical Watermarking , 2018, IEEE Transactions on Image Processing.
[21] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[22] Alessandro Bassi,et al. From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.
[23] Jie Wu,et al. Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring , 2016, IEEE Transactions on Industrial Informatics.
[24] Inmaculada Plaza,et al. Mobile applications in an aging society: Status and trends , 2011, J. Syst. Softw..
[25] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[26] Yanjun Wang,et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2010, Expert Syst. Appl..
[27] Houbing Song,et al. Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.
[28] Yi Yang,et al. Semantic Pooling for Complex Event Analysis in Untrimmed Videos , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Yonghui Zhang,et al. Intelligent Monitoring System on Refrigerator Trucks Based on the Internet of Things , 2011 .
[30] Ira S. Rubinstein,et al. Big Data: The End of Privacy or a New Beginning? , 2013 .
[31] Muli Ben-Yehuda,et al. The Reservoir model and architecture for open federated cloud computing , 2009, IBM J. Res. Dev..
[32] Yutaka Ishibashi,et al. An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework , 2017, Future Gener. Comput. Syst..
[33] Zhihui Li,et al. Beyond Trace Ratio: Weighted Harmonic Mean of Trace Ratios for Multiclass Discriminant Analysis , 2017, IEEE Transactions on Knowledge and Data Engineering.
[34] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[35] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[36] Shahriar Akter,et al. How ‘Big Data’ Can Make Big Impact: Findings from a Systematic Review and a Longitudinal Case Study , 2015 .
[37] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[38] Jin Li,et al. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..
[39] Lida Xu,et al. IoT and Cloud Computing in Automation of Assembly Modeling Systems , 2014, IEEE Transactions on Industrial Informatics.
[40] Zhihan Lv,et al. Next-Generation Big Data Analytics: State of the Art, Challenges, and Future Research Topics , 2017, IEEE Transactions on Industrial Informatics.
[41] Siu-Ming Yiu,et al. HybridORAM: Practical oblivious cloud storage with constant bandwidth , 2018, Inf. Sci..
[42] Zhu Shunbing,et al. Study On Key Technologies Of Internet Of Things Perceiving Mine , 2011 .
[43] Xiaoran Jiang,et al. TCP over 6LoWPAN for Industrial Applications: An Experimental Study , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[44] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[45] Kerry L. Taylor,et al. Semantics for the Internet of Things: Early Progress and Back to the Future , 2019 .
[46] Klaus Moessner,et al. Semantic enablers for dynamic digital-physical object associations in a federated node architecture for the Internet of Things , 2014, Ad Hoc Networks.
[47] Jue-Sam Chou. An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.
[48] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[49] Veda C. Storey,et al. Business Intelligence and Analytics: From Big Data to Big Impact , 2012, MIS Q..
[50] Qiang Chen,et al. Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion , 2012, Information Systems Frontiers.
[51] Yunhao Liu,et al. Big Data: A Survey , 2014, Mob. Networks Appl..
[52] B. B. Gupta,et al. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.
[53] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.