A semi-outsourcing secure data privacy scheme for IoT data transmission
暂无分享,去创建一个
[1] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[2] Flora Malamateniou,et al. Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).
[3] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[4] T. Sudha,et al. Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud , 2018 .
[5] Sudip Misra,et al. Cloud Computing Applications for Smart Grid: A Survey , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Tongrang Fan,et al. A scheme of data management in the Internet of Things , 2010, 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content.
[7] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[8] Jianliang Xu,et al. Processing private queries over untrusted data cloud through privacy homomorphism , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[9] Stefan Poslad,et al. Adaptive security and privacy management for the internet of things (ASPI 2013) , 2013, UbiComp.
[10] Paul Thomas,et al. Low Throughput Networks for the IoT: Lessons learned from industrial implementations , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[11] Stefan Poslad,et al. AN INTEGRATED APPROACH TO USER-CENTERED PRIVACY FOR MOBILE INFORMATION SERVICES , 2006, Appl. Artif. Intell..
[12] Stefan Poslad,et al. Using a Smart City IoT to Incentivise and Target Shifts in Mobility Behaviour—Is It a Piece of Pie? , 2015, Sensors.
[13] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[14] Fei Tao,et al. IoT-Based Intelligent Perception and Access of Manufacturing Resource Toward Cloud Manufacturing , 2014, IEEE Transactions on Industrial Informatics.
[15] Stefan Poslad,et al. An Evaluation Framework for Adaptive Security for the IoT in eHealth , 2014 .