A trust computed framework for IoT devices and fog computing environment
暂无分享,去创建一个
Hemraj Saini | Geetanjali Rathee | Rajinder Sandhu | Vigneswaran Dhasarathan | M. Sivaram | D. Vigneswaran | Geetanjali Rathee | H. Saini | M. Sivaram | Rajinder Sandhu
[1] Yanan Xu,et al. Urban noise mapping with a crowd sensing system , 2019, Wirel. Networks.
[2] Elisa Bertino,et al. Botnets and Internet of Things Security , 2017, Computer.
[3] Cheng Li,et al. Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.
[4] Sangtae Ha,et al. Clarifying Fog Computing and Networking: 10 Questions and Answers , 2017, IEEE Communications Magazine.
[5] Yong Peng,et al. Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing , 2017, IEEE Transactions on Big Data.
[6] Roch H. Glitho,et al. A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.
[7] Joel J. P. C. Rodrigues,et al. Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment , 2019, IEEE Access.
[8] Xianbin Wang,et al. A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication , 2018, IEEE Access.
[9] Mauro Conti,et al. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.
[10] Mukesh Singhal,et al. Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources , 2017, IEEE Transactions on Services Computing.
[11] Xiaodong Lin,et al. Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[12] Stéphane Devismes,et al. SR3: secure resilient reputation-based routing , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.
[13] Hemraj Saini,et al. Modified AODV (MAODV) Against Black Hole in WMN , 2018 .
[14] Jian Shen,et al. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks , 2016, J. Netw. Comput. Appl..
[15] Hemraj Saini,et al. Aspects of Trusted Routing Communication in Smart Networks , 2017, Wireless Personal Communications.
[16] Peter C. Mason,et al. Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.
[17] Xiaodong Lin,et al. Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications , 2016, SecureComm.
[18] Rong Jin,et al. Physical layer multi-user key generation in wireless networks , 2018, Wirel. Networks.
[19] Victor C. M. Leung,et al. Trust-Based Communication for the Industrial Internet of Things , 2018, IEEE Communications Magazine.
[20] Tie Qiu,et al. Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.
[21] Pangun Park,et al. Markov chain model of fault-tolerant wireless networked control systems , 2019, Wirel. Networks.
[22] Mauro Conti,et al. Lightweight solutions to counter DDoS attacks in software defined networking , 2019, Wirel. Networks.
[23] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[24] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[25] Min Ji,et al. CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..
[26] Chunyan Miao,et al. An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies , 2006, IEICE Trans. Inf. Syst..
[27] Jing Zhang,et al. 5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds , 2018, IEEE Communications Magazine.
[28] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[29] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[30] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[31] Hemraj Saini,et al. A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology , 2019, Multimedia Tools and Applications.
[32] Ashwin Machanavajjhala,et al. Worst-Case Background Knowledge for Privacy-Preserving Data Publishing , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[33] David Pointcheval,et al. Short Randomizable Signatures , 2016, CT-RSA.
[34] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[35] Tarik Taleb,et al. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.
[36] Lenka Lhotská,et al. Social Impact Theory Based Optimizer , 2007, ECAL.
[37] Xuemin Shen,et al. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.
[38] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[39] Shailendra Kumar Shrivastava,et al. Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks , 2018 .