메뉴 건너뛰기




Volumn , Issue , 2009, Pages 336-340

Internet of things and privacy preserving technologies

Author keywords

Internet of things; Multi party computations; Privacy; Security; Ubiquitous

Indexed keywords

INTERNET OF THINGS; MULTI-PARTY COMPUTATIONS; PRIVACY; SECURITY; UBIQUITOUS;

EID: 70350755889     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIRELESSVITAE.2009.5172470     Document Type: Conference Paper
Times cited : (94)

References (22)
  • 7
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • Cloudcroft, New Mexico
    • W. Du and M. J. Atallah, "Secure multi-party computation problems and their applications: a review and open problems," in Proceedings of the 2001 workshop on New security paradigms, Cloudcroft, New Mexico, 2001.
    • (2001) Proceedings of the 2001 workshop on New security paradigms
    • Du, W.1    Atallah, M.J.2
  • 12
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas, "Efficient Private Matching and Set Intersection.," in EUROCRYPT'04, 2004, pp. 1-19.
    • (2004) EUROCRYPT'04 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 14
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in EUROCRYPT'99, 1999, pp. 223-238.
    • (1999) EUROCRYPT'99 , pp. 223-238
    • Paillier, P.1
  • 20
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-Based Access Control with Hidden Policies and Hidden Credentials
    • K. Frikken, M. Atallah, and J. Li, "Attribute-Based Access Control with Hidden Policies and Hidden Credentials," IEEE Trans. Comput., vol. 55, pp. 1259-1270, 2006.
    • (2006) IEEE Trans. Comput , vol.55 , pp. 1259-1270
    • Frikken, K.1    Atallah, M.2    Li, J.3
  • 21
    • 27644520949 scopus 로고    scopus 로고
    • Secure outsourcing of sequence comparisons
    • M. J. Atallah and J. Li, "Secure outsourcing of sequence comparisons," Int. J. Inf. Secur., vol. 4, pp. 277-287, 2005.
    • (2005) Int. J. Inf. Secur , vol.4 , pp. 277-287
    • Atallah, M.J.1    Li, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.